Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-49794 (GCVE-0-2025-49794)
Vulnerability from cvelistv5
- CWE-825 - Expired Pointer Dereference
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 10 |
Unaffected: 0:2.12.5-7.el10_0 < * cpe:/o:redhat:enterprise_linux:10.0 |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-49794",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-16T15:50:46.041375Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-16T15:51:46.475Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10.0"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.12.5-7.el10_0",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_els:7"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 7 Extended Lifecycle Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.1-6.el7_9.10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-21.el8_10.1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:8::appstream",
"cpe:/o:redhat:enterprise_linux:8::baseos"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-21.el8_10.1",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.2::appstream",
"cpe:/o:redhat:rhel_aus:8.2::baseos"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.2 Advanced Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-9.el8_2.3",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-9.el8_4.6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_aus:8.4::appstream",
"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos",
"cpe:/o:redhat:rhel_aus:8.4::baseos",
"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-9.el8_4.6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos",
"cpe:/a:redhat:rhel_aus:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-13.el8_6.10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos",
"cpe:/a:redhat:rhel_aus:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.6 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-13.el8_6.10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.6::appstream",
"cpe:/a:redhat:rhel_e4s:8.6::appstream",
"cpe:/o:redhat:rhel_aus:8.6::baseos",
"cpe:/o:redhat:rhel_e4s:8.6::baseos",
"cpe:/o:redhat:rhel_tus:8.6::baseos",
"cpe:/a:redhat:rhel_aus:8.6::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-13.el8_6.10",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.8::appstream",
"cpe:/o:redhat:rhel_e4s:8.8::baseos",
"cpe:/o:redhat:rhel_tus:8.8::baseos",
"cpe:/a:redhat:rhel_e4s:8.8::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.8 Telecommunications Update Service",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-16.el8_8.9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_tus:8.8::appstream",
"cpe:/o:redhat:rhel_e4s:8.8::baseos",
"cpe:/o:redhat:rhel_tus:8.8::baseos",
"cpe:/a:redhat:rhel_e4s:8.8::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.7-16.el8_8.9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.13-10.el9_6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9::baseos",
"cpe:/a:redhat:enterprise_linux:9::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.13-10.el9_6",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:rhel_e4s:9.0::baseos",
"cpe:/a:redhat:rhel_e4s:9.0::appstream"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.13-1.el9_0.5",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_e4s:9.2::appstream",
"cpe:/o:redhat:rhel_e4s:9.2::baseos"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.13-3.el9_2.7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:rhel_eus:9.4::appstream",
"cpe:/o:redhat:rhel_eus:9.4::baseos"
],
"defaultStatus": "affected",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 9.4 Extended Update Support",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:2.9.13-10.el9_4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:jboss_core_services:1"
],
"defaultStatus": "unaffected",
"packageName": "libxml2",
"product": "Red Hat JBoss Core Services 2.4.62.SP2",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.13::el9"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.13",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.14::el9"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.14",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.17::el9"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.17",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.18::el9"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.18",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.19::el9"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.19",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4.20::el9"
],
"defaultStatus": "unaffected",
"packageName": "rhcos",
"product": "Red Hat OpenShift Container Platform 4.20",
"vendor": "Red Hat"
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:webterminal:1.11::el9"
],
"defaultStatus": "affected",
"packageName": "web-terminal/web-terminal-rhel9-operator",
"product": "Red Hat Web Terminal 1.11 on RHEL 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1.11-19",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:webterminal:1.11::el9"
],
"defaultStatus": "affected",
"packageName": "web-terminal/web-terminal-tooling-rhel9",
"product": "Red Hat Web Terminal 1.11 on RHEL 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1.11-8",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:webterminal:1.12::el9"
],
"defaultStatus": "affected",
"packageName": "web-terminal/web-terminal-tooling-rhel9",
"product": "Red Hat Web Terminal 1.12 on RHEL 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "1.12-4",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:cert_manager:1.16::el9"
],
"defaultStatus": "affected",
"packageName": "cert-manager/jetstack-cert-manager-rhel9",
"product": "cert-manager operator for Red Hat OpenShift 1.16",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:insights_proxy:1.5::el9"
],
"defaultStatus": "affected",
"packageName": "insights-proxy/insights-proxy-container-rhel9",
"product": "Red Hat Insights proxy 1.5",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "libxml2",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
}
],
"datePublic": "2025-06-10T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Important"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-825",
"description": "Expired Pointer Dereference",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T05:42:32.730Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2025:10630",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"name": "RHSA-2025:10698",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"name": "RHSA-2025:10699",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"name": "RHSA-2025:11580",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"name": "RHSA-2025:12098",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"name": "RHSA-2025:12099",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"name": "RHSA-2025:12199",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"name": "RHSA-2025:12237",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"name": "RHSA-2025:12239",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"name": "RHSA-2025:12240",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"name": "RHSA-2025:12241",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"name": "RHSA-2025:13335",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"name": "RHSA-2025:15397",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"name": "RHSA-2025:15827",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"name": "RHSA-2025:15828",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"name": "RHSA-2025:18217",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"name": "RHSA-2025:18218",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"name": "RHSA-2025:18219",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"name": "RHSA-2025:18240",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"name": "RHSA-2025:19020",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"name": "RHSA-2025:19041",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"name": "RHSA-2025:19046",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"name": "RHBZ#2372373",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-06-11T21:33:43.044000+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-06-10T00:00:00+00:00",
"value": "Made public."
}
],
"title": "Libxml: heap use after free (uaf) leads to denial of service (dos)",
"workarounds": [
{
"lang": "en",
"value": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix."
}
],
"x_redhatCweChain": "CWE-825: Expired Pointer Dereference"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-49794",
"datePublished": "2025-06-16T15:24:31.020Z",
"dateReserved": "2025-06-10T22:17:05.286Z",
"dateUpdated": "2025-10-30T05:42:32.730Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-49794\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-06-16T16:15:18.997\",\"lastModified\":\"2025-10-30T06:15:44.000\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\\\"...\\\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una vulnerabilidad de use-after-free en libxml2. Este problema se produce al analizar elementos XPath en ciertas circunstancias cuando el esquema XML contiene los elementos de esquema . Esta falla permite a un actor malicioso manipular un documento XML malicioso que se utiliza como entrada para libxml, lo que provoca el bloqueo del programa al usar libxml u otros posibles comportamientos indefinidos.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":9.1,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-825\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:10630\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:10698\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:10699\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:11580\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12098\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12099\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12199\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12237\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12239\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12240\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12241\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:13335\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:15397\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:15827\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:15828\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:18217\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:18218\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:18219\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:18240\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19020\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19041\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/errata/RHSA-2025:19046\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-49794\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2372373\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-49794\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-16T15:50:46.041375Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-16T15:50:49.909Z\"}}], \"cna\": {\"title\": \"Libxml: heap use after free (uaf) leads to denial of service (dos)\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.1, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10.0\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.12.5-7.el10_0\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_els:7\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 7 Extended Lifecycle Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.1-6.el7_9.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\", \"cpe:/o:redhat:enterprise_linux:8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-21.el8_10.1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:enterprise_linux:8::appstream\", \"cpe:/o:redhat:enterprise_linux:8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-21.el8_10.1\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_aus:8.2::appstream\", \"cpe:/o:redhat:rhel_aus:8.2::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.2 Advanced Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-9.el8_2.3\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos\", \"cpe:/o:redhat:rhel_aus:8.4::baseos\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-9.el8_4.6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_eus_long_life:8.4::baseos\", \"cpe:/o:redhat:rhel_aus:8.4::baseos\", \"cpe:/a:redhat:rhel_aus:8.4::appstream\", \"cpe:/a:redhat:rhel_eus_long_life:8.4::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-9.el8_4.6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.6::appstream\", \"cpe:/o:redhat:rhel_tus:8.6::baseos\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_tus:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-13.el8_6.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.6::appstream\", \"cpe:/o:redhat:rhel_tus:8.6::baseos\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_tus:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-13.el8_6.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:8.6::appstream\", \"cpe:/o:redhat:rhel_tus:8.6::baseos\", \"cpe:/o:redhat:rhel_e4s:8.6::baseos\", \"cpe:/o:redhat:rhel_aus:8.6::baseos\", \"cpe:/a:redhat:rhel_aus:8.6::appstream\", \"cpe:/a:redhat:rhel_tus:8.6::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-13.el8_6.10\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_tus:8.8::baseos\", \"cpe:/a:redhat:rhel_tus:8.8::appstream\", \"cpe:/a:redhat:rhel_e4s:8.8::appstream\", \"cpe:/o:redhat:rhel_e4s:8.8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Telecommunications Update Service\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-16.el8_8.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_tus:8.8::baseos\", \"cpe:/a:redhat:rhel_tus:8.8::appstream\", \"cpe:/a:redhat:rhel_e4s:8.8::appstream\", \"cpe:/o:redhat:rhel_e4s:8.8::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.7-16.el8_8.9\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.13-10.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9::baseos\", \"cpe:/a:redhat:enterprise_linux:9::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.13-10.el9_6\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:rhel_e4s:9.0::baseos\", \"cpe:/a:redhat:rhel_e4s:9.0::appstream\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.13-1.el9_0.5\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_e4s:9.2::appstream\", \"cpe:/o:redhat:rhel_e4s:9.2::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.13-3.el9_2.7\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:rhel_eus:9.4::appstream\", \"cpe:/o:redhat:rhel_eus:9.4::baseos\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9.4 Extended Update Support\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"0:2.9.13-10.el9_4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:jboss_core_services:1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat JBoss Core Services 2.4.62.SP2\", \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.13::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.13\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.17::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.17\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.18::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.18\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.19::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.19\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4.20::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4.20\", \"packageName\": \"rhcos\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:webterminal:1.11::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Web Terminal 1.11 on RHEL 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.11-19\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"web-terminal/web-terminal-rhel9-operator\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:webterminal:1.11::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Web Terminal 1.11 on RHEL 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.11-8\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"web-terminal/web-terminal-tooling-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:webterminal:1.12::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Web Terminal 1.12 on RHEL 9\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"1.12-4\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"web-terminal/web-terminal-tooling-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:cert_manager:1.16::el9\"], \"vendor\": \"Red Hat\", \"product\": \"cert-manager operator for Red Hat OpenShift 1.16\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"cert-manager/jetstack-cert-manager-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:insights_proxy:1.5::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Insights proxy 1.5\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"insights-proxy/insights-proxy-container-rhel9\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:6\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 6\", \"packageName\": \"libxml2\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unknown\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-11T21:33:43.044000+00:00\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-06-10T00:00:00+00:00\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-06-10T00:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:10630\", \"name\": \"RHSA-2025:10630\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:10698\", \"name\": \"RHSA-2025:10698\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:10699\", \"name\": \"RHSA-2025:10699\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:11580\", \"name\": \"RHSA-2025:11580\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12098\", \"name\": \"RHSA-2025:12098\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12099\", \"name\": \"RHSA-2025:12099\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12199\", \"name\": \"RHSA-2025:12199\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12237\", \"name\": \"RHSA-2025:12237\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12239\", \"name\": \"RHSA-2025:12239\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12240\", \"name\": \"RHSA-2025:12240\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:12241\", \"name\": \"RHSA-2025:12241\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:13335\", \"name\": \"RHSA-2025:13335\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:15397\", \"name\": \"RHSA-2025:15397\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:15827\", \"name\": \"RHSA-2025:15827\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:15828\", \"name\": \"RHSA-2025:15828\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:18217\", \"name\": \"RHSA-2025:18217\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:18218\", \"name\": \"RHSA-2025:18218\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:18219\", \"name\": \"RHSA-2025:18219\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:18240\", \"name\": \"RHSA-2025:18240\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19020\", \"name\": \"RHSA-2025:19020\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/errata/RHSA-2025:19046\", \"name\": \"RHSA-2025:19046\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-49794\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2372373\", \"name\": \"RHBZ#2372373\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\\\"...\\\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-825\", \"description\": \"Expired Pointer Dereference\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-10-29T12:12:12.442Z\"}, \"x_redhatCweChain\": \"CWE-825: Expired Pointer Dereference\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-49794\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-29T12:12:12.442Z\", \"dateReserved\": \"2025-06-10T22:17:05.286Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-06-16T15:24:31.020Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
rhsa-2025:12098
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12098",
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12098.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:48+00:00",
"generator": {
"date": "2025-10-30T06:43:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:12098",
"initial_release_date": "2025-07-29T13:52:26+00:00",
"revision_history": [
{
"date": "2025-07-29T13:52:26+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-29T13:52:26+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.6::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.6::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.6::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"product": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"product_id": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-13.el8_6.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"product_id": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-13.el8_6.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"product_id": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-13.el8_6.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-13.el8_6.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-13.el8_6.10.i686",
"product": {
"name": "libxml2-0:2.9.7-13.el8_6.10.i686",
"product_id": "libxml2-0:2.9.7-13.el8_6.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-13.el8_6.10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"product_id": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-13.el8_6.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"product_id": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-13.el8_6.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-13.el8_6.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-13.el8_6.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"product": {
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"product_id": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-13.el8_6.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"product_id": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-13.el8_6.10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-13.el8_6.10.src",
"product": {
"name": "libxml2-0:2.9.7-13.el8_6.10.src",
"product_id": "libxml2-0:2.9.7-13.el8_6.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-13.el8_6.10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-13.el8_6.10.aarch64",
"product": {
"name": "libxml2-0:2.9.7-13.el8_6.10.aarch64",
"product_id": "libxml2-0:2.9.7-13.el8_6.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-13.el8_6.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"product": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"product_id": "python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-13.el8_6.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"product": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"product_id": "libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-13.el8_6.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"product_id": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-13.el8_6.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-13.el8_6.10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"product": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"product_id": "libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-13.el8_6.10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"product": {
"name": "libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"product_id": "libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-13.el8_6.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"product": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"product_id": "python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-13.el8_6.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"product_id": "libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-13.el8_6.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-13.el8_6.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-13.el8_6.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"product_id": "libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-13.el8_6.10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-13.el8_6.10.s390x",
"product": {
"name": "libxml2-0:2.9.7-13.el8_6.10.s390x",
"product_id": "libxml2-0:2.9.7-13.el8_6.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-13.el8_6.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"product": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"product_id": "python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-13.el8_6.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"product": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"product_id": "libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-13.el8_6.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"product_id": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-13.el8_6.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-13.el8_6.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"product": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"product_id": "libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-13.el8_6.10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.6)",
"product_id": "AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.src",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.6)",
"product_id": "AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "AppStream-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.src",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.6)",
"product_id": "BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"relates_to_product_reference": "BaseOS-8.6.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T13:52:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-32414",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"discovery_date": "2025-04-08T04:00:51.284113+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358121"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Out-of-Bounds Read in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug affects parsing of text streams using:\n- the Python bindings (pending deprecation: https://gitlab.gnome.org/GNOME/libxml2/-/issues/891)\n- the libxml2 SAX driver drv_libxml2,\n- the XML Reader API\n\nParsing of binary streams is not affected by this vulnerability.\n\nThe vulnerability exists in the libxml2 package the bug arises because of a mismatch between characters vs. bytes handling: functions xmlPythonFileRead and xmlPythonFileReadRaw may compute a length incorrectly (mistaking character count for byte count), but for a succesful exploitation of this bug requires local access, on top of that the path to exploiation is non trivial, where handling of python binding\u0027s and specific input handling of bytes and charcters are required which makes this outside the scope of an attacker and increases the attack complexity, for these reasons this has been marked as moderate by redhat.\n\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-393: Return of Wrong Status Code vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational needs, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to threats in real time, helping prevent or limit exploitation attempts. Robust input validation and error handling ensure all user inputs are thoroughly validated, supporting consistent and secure system responses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32414"
},
{
"category": "external",
"summary": "RHBZ#2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889"
}
],
"release_date": "2025-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T13:52:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Out-of-Bounds Read in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T13:52:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T13:52:26+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"AppStream-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"AppStream-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"AppStream-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.AUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.E4S:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.aarch64",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.ppc64le",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.s390x",
"BaseOS-8.6.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.src",
"BaseOS-8.6.0.Z.TUS:libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-debugsource-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:libxml2-devel-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-0:2.9.7-13.el8_6.10.x86_64",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.i686",
"BaseOS-8.6.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-13.el8_6.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:12099
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12099",
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12099.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:54+00:00",
"generator": {
"date": "2025-10-30T06:43:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:12099",
"initial_release_date": "2025-07-29T13:04:04+00:00",
"revision_history": [
{
"date": "2025-07-29T13:04:04+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-29T13:04:04+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.0::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.0::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-1.el9_0.5.src",
"product": {
"name": "libxml2-0:2.9.13-1.el9_0.5.src",
"product_id": "libxml2-0:2.9.13-1.el9_0.5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-1.el9_0.5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-1.el9_0.5.aarch64",
"product": {
"name": "libxml2-0:2.9.13-1.el9_0.5.aarch64",
"product_id": "libxml2-0:2.9.13-1.el9_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-1.el9_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"product": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"product_id": "python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-1.el9_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"product_id": "libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-1.el9_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"product_id": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-1.el9_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-1.el9_0.5?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"product": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"product_id": "libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-1.el9_0.5?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"product": {
"name": "libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"product_id": "libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-1.el9_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"product": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"product_id": "python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-1.el9_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"product_id": "libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-1.el9_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-1.el9_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-1.el9_0.5?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"product_id": "libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-1.el9_0.5?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-1.el9_0.5.i686",
"product": {
"name": "libxml2-0:2.9.13-1.el9_0.5.i686",
"product_id": "libxml2-0:2.9.13-1.el9_0.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-1.el9_0.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"product_id": "libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-1.el9_0.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"product_id": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-1.el9_0.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-1.el9_0.5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"product": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"product_id": "libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-1.el9_0.5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-1.el9_0.5.x86_64",
"product": {
"name": "libxml2-0:2.9.13-1.el9_0.5.x86_64",
"product_id": "libxml2-0:2.9.13-1.el9_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-1.el9_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"product_id": "python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-1.el9_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"product_id": "libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-1.el9_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-1.el9_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-1.el9_0.5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"product_id": "libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-1.el9_0.5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-1.el9_0.5.s390x",
"product": {
"name": "libxml2-0:2.9.13-1.el9_0.5.s390x",
"product_id": "libxml2-0:2.9.13-1.el9_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-1.el9_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"product": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"product_id": "python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-1.el9_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"product": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"product_id": "libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-1.el9_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"product_id": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-1.el9_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-1.el9_0.5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"product": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"product_id": "libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-1.el9_0.5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.src",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.0)",
"product_id": "AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "AppStream-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.src",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.0)",
"product_id": "BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"relates_to_product_reference": "BaseOS-9.0.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T13:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T13:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T13:04:04+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"AppStream-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"AppStream-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.src",
"BaseOS-9.0.0.Z.E4S:libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-debugsource-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:libxml2-devel-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-0:2.9.13-1.el9_0.5.x86_64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.aarch64",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.i686",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.ppc64le",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.s390x",
"BaseOS-9.0.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-1.el9_0.5.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:10630
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 10.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10630",
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10630.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:44+00:00",
"generator": {
"date": "2025-10-30T06:43:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:10630",
"initial_release_date": "2025-07-08T21:17:21+00:00",
"revision_history": [
{
"date": "2025-07-08T21:17:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-08T21:17:21+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product": {
"name": "Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:10.0"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.12.5-7.el10_0.src",
"product": {
"name": "libxml2-0:2.12.5-7.el10_0.src",
"product_id": "libxml2-0:2.12.5-7.el10_0.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.12.5-7.el10_0.aarch64",
"product": {
"name": "libxml2-0:2.12.5-7.el10_0.aarch64",
"product_id": "libxml2-0:2.12.5-7.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"product": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"product_id": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"product": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"product": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"product": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"product_id": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
"product": {
"name": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
"product_id": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.12.5-7.el10_0.ppc64le",
"product": {
"name": "libxml2-0:2.12.5-7.el10_0.ppc64le",
"product_id": "libxml2-0:2.12.5-7.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"product": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"product_id": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"product": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"product_id": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"product": {
"name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"product_id": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.12.5-7.el10_0.x86_64",
"product": {
"name": "libxml2-0:2.12.5-7.el10_0.x86_64",
"product_id": "libxml2-0:2.12.5-7.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"product": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"product_id": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"product": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"product_id": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
"product": {
"name": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
"product_id": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.12.5-7.el10_0.s390x",
"product": {
"name": "libxml2-0:2.12.5-7.el10_0.s390x",
"product_id": "libxml2-0:2.12.5-7.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.12.5-7.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
"product": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
"product_id": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.12.5-7.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"product": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"product_id": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.12.5-7.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"product_id": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.12.5-7.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"product": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"product_id": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.12.5-7.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
"product": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
"product_id": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.12.5-7.el10_0?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.12.5-7.el10_0.s390x",
"product": {
"name": "libxml2-static-0:2.12.5-7.el10_0.s390x",
"product_id": "libxml2-static-0:2.12.5-7.el10_0.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.12.5-7.el10_0?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.src as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.src",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 10)",
"product_id": "AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "AppStream-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.src as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.src",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 10)",
"product_id": "BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "BaseOS-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.src as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.src",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "libxml2-static-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"relates_to_product_reference": "CRB-10.0.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64 as a component of Red Hat Enterprise Linux CodeReady Linux Builder (v. 10)",
"product_id": "CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"relates_to_product_reference": "CRB-10.0.Z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-08T21:17:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-08T21:17:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49795",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-12T00:31:08.194000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372379"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Null pointer dereference leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important rather than Moderate due to its triggerability through untrusted input and impact on availability in a widely-used XML processing library like libxml2, which is often embedded in system-level and server-side applications. Although it is \"just\" a NULL pointer dereference\u2014typically classified as a DoS\u2014the context significantly elevates its severity. libxml2 frequently operates in environments that parse external XML content, such as web services, security scanners, and document processors. A crafted XML exploiting malformed XPath in Schematron schemas can reliably crash the application without requiring special privileges or user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49795"
},
{
"category": "external",
"summary": "RHBZ#2372379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-08T21:17:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"category": "workaround",
"details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Null pointer dereference leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-08T21:17:21+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"AppStream-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"AppStream-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"BaseOS-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"BaseOS-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.src",
"CRB-10.0.Z:libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-debugsource-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-devel-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:libxml2-static-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-0:2.12.5-7.el10_0.x86_64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.aarch64",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.ppc64le",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.s390x",
"CRB-10.0.Z:python3-libxml2-debuginfo-0:2.12.5-7.el10_0.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:15828
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated web-terminal/tooling container image is now available for Red Hat Web Terminal 1.11 on RHEL 9.",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Web Terminal 1.11 on RHEL 9 container images have been updated to fix the following important CVEs: CVE-2025-5914, CVE-2025-49794, CVE-2025-49796, CVE-2025-6020, CVE-2025-48384, CVE-2025-48385, CVE-2025-7425, CVE-2025-6965, CVE-2025-8941.\n\nUsers of Red Hat Web Terminal 1.11 on RHEL 9 container images are advised to\nupgrade to these updated images, which contain backported patches to correct\nthese security issues, fix these bugs and add these enhancements. Users of these\nimages are also encouraged to rebuild all container images that depend on these\nimages.\n\nYou can find images updated by this advisory in Red Hat Container Catalog (see References).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15828",
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://catalog.redhat.com/software/containers/registry/registry.access.redhat.com/repository/web-terminal/tooling",
"url": "https://catalog.redhat.com/software/containers/registry/registry.access.redhat.com/repository/web-terminal/tooling"
},
{
"category": "external",
"summary": "2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372512"
},
{
"category": "external",
"summary": "2378806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378806"
},
{
"category": "external",
"summary": "2378808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378808"
},
{
"category": "external",
"summary": "2379274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2388220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388220"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15828.json"
}
],
"title": "Red Hat Security Advisory: updated web-terminal/tooling container image",
"tracking": {
"current_release_date": "2025-10-30T06:44:02+00:00",
"generator": {
"date": "2025-10-30T06:44:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:15828",
"initial_release_date": "2025-09-15T15:14:08+00:00",
"revision_history": [
{
"date": "2025-09-15T15:14:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-15T15:14:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.11 on RHEL 9",
"product": {
"name": "Red Hat Web Terminal 1.11 on RHEL 9",
"product_id": "9Base-WebTerminal-1.11",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.11::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"product": {
"name": "web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"product_id": "web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal/web-terminal-rhel9-operator\u0026tag=1.11-19"
}
}
},
{
"category": "product_version",
"name": "web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64",
"product": {
"name": "web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64",
"product_id": "web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal/web-terminal-tooling-rhel9\u0026tag=1.11-8"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64 as a component of Red Hat Web Terminal 1.11 on RHEL 9",
"product_id": "9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64"
},
"product_reference": "web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"relates_to_product_reference": "9Base-WebTerminal-1.11"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64 as a component of Red Hat Web Terminal 1.11 on RHEL 9",
"product_id": "9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
},
"product_reference": "web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64",
"relates_to_product_reference": "9Base-WebTerminal-1.11"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"acknowledgments": [
{
"names": [
"Olivier BAL-PETRE"
],
"organization": "ANSSI - French Cybersecurity Agency"
}
],
"cve": "CVE-2025-6020",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-12T16:33:01.214000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372512"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "linux-pam: Linux-pam directory Traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in pam_namespace marked as Important rather than Moderate due to its direct impact on privilege boundaries and the ease of exploitation in common configurations. By leveraging symlink attacks or race conditions in polyinstantiated directories under their control, unprivileged local users can escalate to root, compromising the entire system. Since pam_namespace is often used in multi-user environments (e.g., shared systems, terminal servers, containers), a misconfigured or partially protected setup becomes a single point of failure. The attack does not require special capabilities or kernel-level exploits\u2014just timing and control over certain paths\u2014making it both reliable and low-barrier. Moreover, privilege escalation flaws like this can be chained with other vulnerabilities to persist or evade detection, further amplifying the risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6020"
},
{
"category": "external",
"summary": "RHBZ#2372512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372512"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6020"
}
],
"release_date": "2025-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "Disable the `pam_namespace` module if it is not essential for your environment, or carefully review and configure it to avoid operating on any directories or paths that can be influenced or controlled by unprivileged users, such as user home directories or world-writable locations like `/tmp`.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "linux-pam: Linux-pam directory Traversal"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Sergei Glazunov"
],
"organization": "Google Project Zero"
}
],
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-07-10T09:37:28.172000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This heap-use-after-free vulnerability in libxslt is rated Important because it can lead to memory corruption and application crashes. The flaw arises when internal attribute metadata (atype) is modified by libxslt\u0027s xsltSetSourceNodeFlags() function during processing of result tree fragments. If the flag corruption prevents proper removal of ID references, later memory cleanup routines may operate on already-freed memory. Since libxslt is commonly used in server-side XML processing, this could result in denial-of-service or potentially facilitate code execution under certain memory reuse conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "RHBZ#2379274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
}
],
"release_date": "2025-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr"
},
{
"cve": "CVE-2025-8941",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-08-13T12:11:55.270000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \"complete\" fix for CVE-2025-6020.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "linux-pam: Incomplete fix for CVE-2025-6020",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in pam_namespace is rated Important because it allows a local, unprivileged user to escalate privileges to root by exploiting symlink attacks or race conditions in polyinstantiated directories under their control. Successful exploitation requires only the ability to create and manipulate filesystem paths in such directories, without the need for special capabilities or kernel-level vulnerabilities. In multi-user environments\u2014such as shared systems, terminal servers, or certain container deployments, an unprotected or misconfigured pam_namespace configuration can serve as a single point of compromise. Privilege escalation flaws of this nature may also be chained with other vulnerabilities to maintain persistence or evade detection, further increasing the overall impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8941"
},
{
"category": "external",
"summary": "RHBZ#2388220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8941"
}
],
"release_date": "2025-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "Disable the `pam_namespace` module if it is not essential for your environment, or carefully review and configure it to avoid operating on any directories or paths that can be influenced or controlled by unprivileged users, such as user home directories or world-writable locations like `/tmp`.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "linux-pam: Incomplete fix for CVE-2025-6020"
},
{
"cve": "CVE-2025-48384",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-07-08T19:00:48.297925+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2378806"
}
],
"notes": [
{
"category": "description",
"text": "A line-end handling flaw was found in Git. When writing a config entry, values with a trailing carriage return (CR) are not quoted, resulting in the CR being lost when the config is read later. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read, resulting in the submodule being checked out to an incorrect location.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: Git arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important and not Moderate flaw because it undermines Git\u2019s path and config integrity by allowing carriage return (\\r) injection to manipulate submodule checkout behavior. Git previously failed to quote config values containing trailing CR, causing the value to be misinterpreted when read back. In the context of submodules, this leads to incorrect path resolution, allowing an attacker to redirect the checkout path via a symlink to a sensitive directory like .git/modules/\u003csubmodule\u003e/hooks. If an executable post-checkout hook exists there, it could be inadvertently executed, resulting in arbitrary code execution during submodule operations. This is particularly dangerous in automated CI/CD pipelines or multi-repo projects where submodules are initialized or updated without manual inspection.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48384"
},
{
"category": "external",
"summary": "RHBZ#2378806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48384"
},
{
"category": "external",
"summary": "https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384",
"url": "https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384"
},
{
"category": "external",
"summary": "https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89",
"url": "https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89"
},
{
"category": "external",
"summary": "https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9",
"url": "https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2025-07-08T18:23:48.710000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using --recurse-submodules when cloning repositories from untrusted sources; instead, clone normally and only initialize or update submodules manually after reviewing them.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-08-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "git: Git arbitrary code execution"
},
{
"cve": "CVE-2025-48385",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2025-07-08T19:00:55.106787+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2378808"
}
],
"notes": [
{
"category": "description",
"text": "A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: Git arbitrary file writes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important rather than a Moderate flaw because it enables protocol injection at the transport layer of Git\u0027s bundle-uri mechanism, allowing a remote server to manipulate how and where data is written on the client system during a clone operation. The lack of input sanitization on user-controlled values like the URI and target path means that malformed inputs containing spaces or newlines can break protocol framing, leading to arbitrary file writes. In scenarios such as CI pipelines, developer environments, or recursive clones with submodules, an attacker can exploit this to overwrite critical files or inject malicious content, potentially achieving remote code execution (RCE).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48385"
},
{
"category": "external",
"summary": "RHBZ#2378808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385"
},
{
"category": "external",
"summary": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655",
"url": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655"
}
],
"release_date": "2025-07-08T18:23:44.405000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "git: Git arbitrary file writes"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:14:08+00:00",
"details": "The Red Hat Web Terminal 1.11 on RHEL 9 container images provided by this update\ncan be downloaded from the Red Hat Container Registry at\nregistry.access.redhat.com. Installation instructions for your platform are\navailable at Red Hat Container Catalog (see References).\n\nDockerfiles and scripts should be amended either to refer to this new image\nspecifically, or to the latest image generally.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.11:web-terminal/web-terminal-rhel9-operator@sha256:97ba3d6db8959c3ccfef82325d9fe8098fb86cc4ecb0bb00933340c693d98603_amd64",
"9Base-WebTerminal-1.11:web-terminal/web-terminal-tooling-rhel9@sha256:fcda84411ef1356fb44a6b16d1ab95189f31ca056cc977114c395da0c5b202bf_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:10699
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10699",
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10699.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:44+00:00",
"generator": {
"date": "2025-10-30T06:43:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:10699",
"initial_release_date": "2025-07-09T12:18:48+00:00",
"revision_history": [
{
"date": "2025-07-09T12:18:48+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-09T12:18:48+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"product_id": "libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_6.aarch64",
"product": {
"name": "libxml2-0:2.9.13-10.el9_6.aarch64",
"product_id": "libxml2-0:2.9.13-10.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_6?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"product_id": "python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_6?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"product_id": "libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_6.ppc64le",
"product": {
"name": "libxml2-0:2.9.13-10.el9_6.ppc64le",
"product_id": "libxml2-0:2.9.13-10.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_6?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"product_id": "python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_6?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_6.i686",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.i686",
"product_id": "libxml2-devel-0:2.9.13-10.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_6.i686",
"product": {
"name": "libxml2-0:2.9.13-10.el9_6.i686",
"product_id": "libxml2-0:2.9.13-10.el9_6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"product_id": "libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_6.x86_64",
"product": {
"name": "libxml2-0:2.9.13-10.el9_6.x86_64",
"product_id": "libxml2-0:2.9.13-10.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"product_id": "python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_6.s390x",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.s390x",
"product_id": "libxml2-devel-0:2.9.13-10.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_6.s390x",
"product": {
"name": "libxml2-0:2.9.13-10.el9_6.s390x",
"product_id": "libxml2-0:2.9.13-10.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_6?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_6.s390x",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.s390x",
"product_id": "python3-libxml2-0:2.9.13-10.el9_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_6?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_6.src",
"product": {
"name": "libxml2-0:2.9.13-10.el9_6.src",
"product_id": "libxml2-0:2.9.13-10.el9_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.src",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "AppStream-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.src as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.src",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 9)",
"product_id": "BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"relates_to_product_reference": "BaseOS-9.6.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-09T12:18:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-09T12:18:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-09T12:18:48+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"AppStream-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.src",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:libxml2-devel-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-0:2.9.13-10.el9_6.x86_64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.aarch64",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.i686",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.ppc64le",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.s390x",
"BaseOS-9.6.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:11580
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 9.4 Extended Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:11580",
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_11580.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:47+00:00",
"generator": {
"date": "2025-10-30T06:43:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:11580",
"initial_release_date": "2025-07-23T05:06:37+00:00",
"revision_history": [
{
"date": "2025-07-23T05:06:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-23T05:06:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus:9.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus:9.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"product_id": "libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_4.aarch64",
"product": {
"name": "libxml2-0:2.9.13-10.el9_4.aarch64",
"product_id": "libxml2-0:2.9.13-10.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_4?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"product_id": "python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_4?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"product_id": "libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_4.ppc64le",
"product": {
"name": "libxml2-0:2.9.13-10.el9_4.ppc64le",
"product_id": "libxml2-0:2.9.13-10.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_4?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"product_id": "python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_4?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_4.i686",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.i686",
"product_id": "libxml2-devel-0:2.9.13-10.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_4?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_4.i686",
"product": {
"name": "libxml2-0:2.9.13-10.el9_4.i686",
"product_id": "libxml2-0:2.9.13-10.el9_4.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_4?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"product_id": "libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_4.x86_64",
"product": {
"name": "libxml2-0:2.9.13-10.el9_4.x86_64",
"product_id": "libxml2-0:2.9.13-10.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_4?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"product_id": "python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_4?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-10.el9_4.s390x",
"product": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.s390x",
"product_id": "libxml2-devel-0:2.9.13-10.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-10.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"product": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"product_id": "libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-10.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"product_id": "libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-10.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-10.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_4.s390x",
"product": {
"name": "libxml2-0:2.9.13-10.el9_4.s390x",
"product_id": "libxml2-0:2.9.13-10.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_4?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-10.el9_4.s390x",
"product": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.s390x",
"product_id": "python3-libxml2-0:2.9.13-10.el9_4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-10.el9_4?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-10.el9_4.src",
"product": {
"name": "libxml2-0:2.9.13-10.el9_4.src",
"product_id": "libxml2-0:2.9.13-10.el9_4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-10.el9_4?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.src as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.src",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS (v.9.4)",
"product_id": "AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "AppStream-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.src as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.src",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS (v.9.4)",
"product_id": "BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"relates_to_product_reference": "BaseOS-9.4.0.Z.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-23T05:06:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-23T05:06:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-23T05:06:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"AppStream-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"AppStream-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.src",
"BaseOS-9.4.0.Z.EUS:libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-debugsource-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:libxml2-devel-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-0:2.9.13-10.el9_4.x86_64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.aarch64",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.i686",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.ppc64le",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.s390x",
"BaseOS-9.4.0.Z.EUS:python3-libxml2-debuginfo-0:2.9.13-10.el9_4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:19041
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.14.58 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\n This release includes a security update for Red Hat OpenShift Container\nPlatform 4.14.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.14.58. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/155474\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/\n\nSecurity Fix(es):\n\n* libarchive: Double free at archive_read_format_rar_seek_data() in\narchive_read_support_format_rar.c (CVE-2025-5914)\n* unbound: Unbound Cache poisoning (CVE-2025-5994)\n* sqlite: Integer Truncation in SQLite (CVE-2025-6965)\n* podman: Podman kube play command may overwrite host files (CVE-2025-9566)\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS)\n(CVE-2025-49794)\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nAll OpenShift Container Platform 4.14 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19041",
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19041.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.14.58 bug fix and security update",
"tracking": {
"current_release_date": "2025-10-30T06:44:09+00:00",
"generator": {
"date": "2025-10-30T06:44:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:19041",
"initial_release_date": "2025-10-30T05:41:47+00:00",
"revision_history": [
{
"date": "2025-10-30T05:41:47+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-30T05:41:47+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.14",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14",
"product_id": "Red Hat OpenShift Container Platform 4.14",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.14::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.14"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-30T05:41:47+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.14 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"cve": "CVE-2025-5994",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"discovery_date": "2025-07-16T15:01:36.497027+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380949"
}
],
"notes": [
{
"category": "description",
"text": "A cache poisoning flaw was found in Unbound. Resolvers supporting EDNS Client Subnet (ECS) must segregate outgoing queries to accommodate different outgoing ECS information. This issue reopens resolvers to a birthday paradox attack, known as the Rebirthday Attack, which attempts to match the DNS transaction ID with cache non-ECS poisoned replies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound Cache poisoning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is considered Important rather than Moderate because it directly compromises the integrity of DNS caching mechanisms in resolvers supporting EDNS Client Subnet (ECS). The flaw allows an attacker to exploit the birthday paradox by generating a high volume of concurrent queries with different ECS values, thereby increasing the chance of a transaction ID collision with a spoofed response. If the resolver fails to properly segregate cache entries by ECS scope, it may accept and cache a malicious non-ECS response, effectively leading to DNS cache poisoning. Unlike typical poisoning attempts that require precise timing or privileged network positions, this attack can be carried out remotely with a high success rate, especially in resolvers that do not correctly isolate ECS queries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.14"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5994"
},
{
"category": "external",
"summary": "RHBZ#2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt",
"url": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt"
}
],
"release_date": "2025-07-16T14:38:22.738000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-30T05:41:47+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.14 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound Cache poisoning"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.14"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-30T05:41:47+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.14 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Paul Holzinger"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-9566",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-04T15:45:46.448000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393152"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.\n\nBinary-Affected: podman\nUpstream-version-introduced: v4.0.0\nUpstream-version-fixed: v5.6.1",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Podman kube play command may overwrite host files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having the Important severity. This happens because of the consequences of an successful attack and the low complexity (AC:L) on exploiting this vulnerability. Although the attacker cannot control the content written to the target file, depending on which file was targeted, the exploitation of this flaw may lead sensitive data corruption (I:H) and leading the system to crash resulting in a Denial of Service attack (A:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.14"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9566"
},
{
"category": "external",
"summary": "RHBZ#2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-30T05:41:47+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.14 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"category": "workaround",
"details": "Red Hat advises to not run the podman kube play command with untrusted Kubernetes YAML file as input, additionally review the Kubernetes YAML file before running it through podman may help to catch maliciously crafted secretes or volumes that may be used to exploit this vulnerability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "podman: Podman kube play command may overwrite host files"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.14"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-30T05:41:47+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.14 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.14"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-30T05:41:47+00:00",
"details": "For OpenShift Container Platform 4.14 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.14 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.14/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.14"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:12239
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions and Red Hat Enterprise Linux 8.8 Telecommunications Update Service.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12239",
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12239.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:47+00:00",
"generator": {
"date": "2025-10-30T06:43:47+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:12239",
"initial_release_date": "2025-07-30T07:14:41+00:00",
"revision_history": [
{
"date": "2025-07-30T07:14:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T07:14:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:47+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:8.8::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_tus:8.8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_tus:8.8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-16.el8_8.9.src",
"product": {
"name": "libxml2-0:2.9.7-16.el8_8.9.src",
"product_id": "libxml2-0:2.9.7-16.el8_8.9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-16.el8_8.9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"product": {
"name": "libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"product_id": "libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-16.el8_8.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"product": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"product_id": "python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-16.el8_8.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"product_id": "libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-16.el8_8.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-16.el8_8.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-16.el8_8.9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"product_id": "libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-16.el8_8.9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-16.el8_8.9.i686",
"product": {
"name": "libxml2-0:2.9.7-16.el8_8.9.i686",
"product_id": "libxml2-0:2.9.7-16.el8_8.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-16.el8_8.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"product_id": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-16.el8_8.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"product_id": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-16.el8_8.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-16.el8_8.9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"product": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"product_id": "libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-16.el8_8.9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-16.el8_8.9.x86_64",
"product": {
"name": "libxml2-0:2.9.7-16.el8_8.9.x86_64",
"product_id": "libxml2-0:2.9.7-16.el8_8.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-16.el8_8.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"product_id": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-16.el8_8.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"product_id": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-16.el8_8.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-16.el8_8.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-16.el8_8.9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"product_id": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-16.el8_8.9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.src as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.8.8)",
"product_id": "AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.src as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.src",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux AppStream TUS (v.8.8)",
"product_id": "AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "AppStream-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.src as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.src",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64 as a component of Red Hat Enterprise Linux BaseOS TUS (v.8.8)",
"product_id": "BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"relates_to_product_reference": "BaseOS-8.8.0.Z.TUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:14:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-32414",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"discovery_date": "2025-04-08T04:00:51.284113+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358121"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Out-of-Bounds Read in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug affects parsing of text streams using:\n- the Python bindings (pending deprecation: https://gitlab.gnome.org/GNOME/libxml2/-/issues/891)\n- the libxml2 SAX driver drv_libxml2,\n- the XML Reader API\n\nParsing of binary streams is not affected by this vulnerability.\n\nThe vulnerability exists in the libxml2 package the bug arises because of a mismatch between characters vs. bytes handling: functions xmlPythonFileRead and xmlPythonFileReadRaw may compute a length incorrectly (mistaking character count for byte count), but for a succesful exploitation of this bug requires local access, on top of that the path to exploiation is non trivial, where handling of python binding\u0027s and specific input handling of bytes and charcters are required which makes this outside the scope of an attacker and increases the attack complexity, for these reasons this has been marked as moderate by redhat.\n\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-393: Return of Wrong Status Code vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational needs, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to threats in real time, helping prevent or limit exploitation attempts. Robust input validation and error handling ensure all user inputs are thoroughly validated, supporting consistent and secure system responses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32414"
},
{
"category": "external",
"summary": "RHBZ#2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889"
}
],
"release_date": "2025-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:14:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Out-of-Bounds Read in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:14:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:14:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"AppStream-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"AppStream-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"AppStream-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.E4S:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.ppc64le",
"BaseOS-8.8.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.src",
"BaseOS-8.8.0.Z.TUS:libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-debugsource-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:libxml2-devel-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-0:2.9.7-16.el8_8.9.x86_64",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.i686",
"BaseOS-8.8.0.Z.TUS:python3-libxml2-debuginfo-0:2.9.7-16.el8_8.9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:10698
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:10698",
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "RHEL-74345",
"url": "https://issues.redhat.com/browse/RHEL-74345"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_10698.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:40+00:00",
"generator": {
"date": "2025-10-30T06:43:40+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:10698",
"initial_release_date": "2025-07-09T12:04:08+00:00",
"revision_history": [
{
"date": "2025-07-09T12:04:08+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-09T12:04:08+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:40+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:8::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"product": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"product_id": "libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-21.el8_10.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"product": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"product_id": "libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-21.el8_10.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"product_id": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-21.el8_10.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-21.el8_10.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-21.el8_10.1.aarch64",
"product": {
"name": "libxml2-0:2.9.7-21.el8_10.1.aarch64",
"product_id": "libxml2-0:2.9.7-21.el8_10.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.1?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"product": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"product_id": "python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-21.el8_10.1?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"product_id": "libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-21.el8_10.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"product_id": "libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-21.el8_10.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-21.el8_10.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-21.el8_10.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"product": {
"name": "libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"product_id": "libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.1?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"product": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"product_id": "python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-21.el8_10.1?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"product": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"product_id": "libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-21.el8_10.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"product_id": "libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-21.el8_10.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"product_id": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-21.el8_10.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-21.el8_10.1?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-21.el8_10.1.i686",
"product": {
"name": "libxml2-0:2.9.7-21.el8_10.1.i686",
"product_id": "libxml2-0:2.9.7-21.el8_10.1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.1?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"product_id": "libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-21.el8_10.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"product_id": "libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-21.el8_10.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-21.el8_10.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-21.el8_10.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-21.el8_10.1.x86_64",
"product": {
"name": "libxml2-0:2.9.7-21.el8_10.1.x86_64",
"product_id": "libxml2-0:2.9.7-21.el8_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.1?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"product_id": "python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-21.el8_10.1?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"product": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"product_id": "libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-21.el8_10.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"product": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"product_id": "libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-21.el8_10.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"product_id": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-21.el8_10.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-21.el8_10.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-21.el8_10.1.s390x",
"product": {
"name": "libxml2-0:2.9.7-21.el8_10.1.s390x",
"product_id": "libxml2-0:2.9.7-21.el8_10.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.1?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"product": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"product_id": "python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-21.el8_10.1?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-21.el8_10.1.src",
"product": {
"name": "libxml2-0:2.9.7-21.el8_10.1.src",
"product_id": "libxml2-0:2.9.7-21.el8_10.1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-21.el8_10.1?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.src",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)",
"product_id": "BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"relates_to_product_reference": "BaseOS-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-09T12:04:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-09T12:04:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-09T12:04:08+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.src",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-debugsource-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:libxml2-devel-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-0:2.9.7-21.el8_10.1.x86_64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.aarch64",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.i686",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.ppc64le",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.s390x",
"BaseOS-8.10.0.Z.MAIN.EUS:python3-libxml2-debuginfo-0:2.9.7-21.el8_10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:12237
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12237",
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12237.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:56+00:00",
"generator": {
"date": "2025-10-30T06:43:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:12237",
"initial_release_date": "2025-07-30T05:36:37+00:00",
"revision_history": [
{
"date": "2025-07-30T05:36:37+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T05:36:37+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"product": {
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"product_id": "libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-9.el8_2.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"product_id": "libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-9.el8_2.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"product_id": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-9.el8_2.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-9.el8_2.3?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-9.el8_2.3.i686",
"product": {
"name": "libxml2-0:2.9.7-9.el8_2.3.i686",
"product_id": "libxml2-0:2.9.7-9.el8_2.3.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-9.el8_2.3?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"product_id": "libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-9.el8_2.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"product_id": "libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-9.el8_2.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-9.el8_2.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-9.el8_2.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-9.el8_2.3.x86_64",
"product": {
"name": "libxml2-0:2.9.7-9.el8_2.3.x86_64",
"product_id": "libxml2-0:2.9.7-9.el8_2.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-9.el8_2.3?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"product_id": "python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-9.el8_2.3?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-9.el8_2.3.src",
"product": {
"name": "libxml2-0:2.9.7-9.el8_2.3.src",
"product_id": "libxml2-0:2.9.7-9.el8_2.3.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-9.el8_2.3?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_2.3.src as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src"
},
"product_reference": "libxml2-0:2.9.7-9.el8_2.3.src",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v. 8.2)",
"product_id": "AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "AppStream-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_2.3.src as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src"
},
"product_reference": "libxml2-0:2.9.7-9.el8_2.3.src",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v. 8.2)",
"product_id": "BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"relates_to_product_reference": "BaseOS-8.2.0.Z.AUS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T05:36:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-32414",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"discovery_date": "2025-04-08T04:00:51.284113+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358121"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Out-of-Bounds Read in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug affects parsing of text streams using:\n- the Python bindings (pending deprecation: https://gitlab.gnome.org/GNOME/libxml2/-/issues/891)\n- the libxml2 SAX driver drv_libxml2,\n- the XML Reader API\n\nParsing of binary streams is not affected by this vulnerability.\n\nThe vulnerability exists in the libxml2 package the bug arises because of a mismatch between characters vs. bytes handling: functions xmlPythonFileRead and xmlPythonFileReadRaw may compute a length incorrectly (mistaking character count for byte count), but for a succesful exploitation of this bug requires local access, on top of that the path to exploiation is non trivial, where handling of python binding\u0027s and specific input handling of bytes and charcters are required which makes this outside the scope of an attacker and increases the attack complexity, for these reasons this has been marked as moderate by redhat.\n\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-393: Return of Wrong Status Code vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational needs, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to threats in real time, helping prevent or limit exploitation attempts. Robust input validation and error handling ensure all user inputs are thoroughly validated, supporting consistent and secure system responses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32414"
},
{
"category": "external",
"summary": "RHBZ#2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889"
}
],
"release_date": "2025-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T05:36:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Out-of-Bounds Read in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T05:36:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T05:36:37+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"AppStream-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"AppStream-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.src",
"BaseOS-8.2.0.Z.AUS:libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_2.3.x86_64",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.i686",
"BaseOS-8.2.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_2.3.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:19046
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.18.27 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.18.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.18.27. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/155476\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nSecurity Fix(es):\n\n* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)\n* unbound: Unbound Cache poisoning (CVE-2025-5994)\n* sqlite: Integer Truncation in SQLite (CVE-2025-6965)\n* podman: Podman kube play command may overwrite host files (CVE-2025-9566)\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19046",
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "external",
"summary": "OCPBUGS-62810",
"url": "https://issues.redhat.com/browse/OCPBUGS-62810"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19046.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.18.27 bug fix and security update",
"tracking": {
"current_release_date": "2025-10-30T06:44:08+00:00",
"generator": {
"date": "2025-10-30T06:44:08+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:19046",
"initial_release_date": "2025-10-29T09:26:54+00:00",
"revision_history": [
{
"date": "2025-10-29T09:26:54+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-29T09:26:54+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:08+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.18",
"product": {
"name": "Red Hat OpenShift Container Platform 4.18",
"product_id": "Red Hat OpenShift Container Platform 4.18",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.18::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-29T09:26:54+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"cve": "CVE-2025-5994",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"discovery_date": "2025-07-16T15:01:36.497027+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380949"
}
],
"notes": [
{
"category": "description",
"text": "A cache poisoning flaw was found in Unbound. Resolvers supporting EDNS Client Subnet (ECS) must segregate outgoing queries to accommodate different outgoing ECS information. This issue reopens resolvers to a birthday paradox attack, known as the Rebirthday Attack, which attempts to match the DNS transaction ID with cache non-ECS poisoned replies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound Cache poisoning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is considered Important rather than Moderate because it directly compromises the integrity of DNS caching mechanisms in resolvers supporting EDNS Client Subnet (ECS). The flaw allows an attacker to exploit the birthday paradox by generating a high volume of concurrent queries with different ECS values, thereby increasing the chance of a transaction ID collision with a spoofed response. If the resolver fails to properly segregate cache entries by ECS scope, it may accept and cache a malicious non-ECS response, effectively leading to DNS cache poisoning. Unlike typical poisoning attempts that require precise timing or privileged network positions, this attack can be carried out remotely with a high success rate, especially in resolvers that do not correctly isolate ECS queries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5994"
},
{
"category": "external",
"summary": "RHBZ#2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt",
"url": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt"
}
],
"release_date": "2025-07-16T14:38:22.738000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-29T09:26:54+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound Cache poisoning"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-29T09:26:54+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Paul Holzinger"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-9566",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-04T15:45:46.448000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393152"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.\n\nBinary-Affected: podman\nUpstream-version-introduced: v4.0.0\nUpstream-version-fixed: v5.6.1",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Podman kube play command may overwrite host files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having the Important severity. This happens because of the consequences of an successful attack and the low complexity (AC:L) on exploiting this vulnerability. Although the attacker cannot control the content written to the target file, depending on which file was targeted, the exploitation of this flaw may lead sensitive data corruption (I:H) and leading the system to crash resulting in a Denial of Service attack (A:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9566"
},
{
"category": "external",
"summary": "RHBZ#2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-29T09:26:54+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "workaround",
"details": "Red Hat advises to not run the podman kube play command with untrusted Kubernetes YAML file as input, additionally review the Kubernetes YAML file before running it through podman may help to catch maliciously crafted secretes or volumes that may be used to exploit this vulnerability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "podman: Podman kube play command may overwrite host files"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-29T09:26:54+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.18"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-29T09:26:54+00:00",
"details": "For OpenShift Container Platform 4.18 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.18 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.18/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.18"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:12199
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12199",
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12199.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:54+00:00",
"generator": {
"date": "2025-10-30T06:43:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:12199",
"initial_release_date": "2025-07-29T16:02:55+00:00",
"revision_history": [
{
"date": "2025-07-29T16:02:55+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-29T16:02:55+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_e4s:9.2::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_e4s:9.2::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-3.el9_2.7.src",
"product": {
"name": "libxml2-0:2.9.13-3.el9_2.7.src",
"product_id": "libxml2-0:2.9.13-3.el9_2.7.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-3.el9_2.7?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-3.el9_2.7.aarch64",
"product": {
"name": "libxml2-0:2.9.13-3.el9_2.7.aarch64",
"product_id": "libxml2-0:2.9.13-3.el9_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-3.el9_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"product": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"product_id": "python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-3.el9_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"product_id": "libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-3.el9_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"product_id": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-3.el9_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-3.el9_2.7?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"product": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"product_id": "libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_2.7?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"product": {
"name": "libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"product_id": "libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-3.el9_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"product": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"product_id": "python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-3.el9_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"product": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"product_id": "libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-3.el9_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-3.el9_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-3.el9_2.7?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"product_id": "libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_2.7?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-3.el9_2.7.i686",
"product": {
"name": "libxml2-0:2.9.13-3.el9_2.7.i686",
"product_id": "libxml2-0:2.9.13-3.el9_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-3.el9_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"product_id": "libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-3.el9_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"product_id": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-3.el9_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-3.el9_2.7?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"product": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"product_id": "libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_2.7?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-3.el9_2.7.x86_64",
"product": {
"name": "libxml2-0:2.9.13-3.el9_2.7.x86_64",
"product_id": "libxml2-0:2.9.13-3.el9_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-3.el9_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"product_id": "python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-3.el9_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"product_id": "libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-3.el9_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-3.el9_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-3.el9_2.7?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"product_id": "libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_2.7?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.13-3.el9_2.7.s390x",
"product": {
"name": "libxml2-0:2.9.13-3.el9_2.7.s390x",
"product_id": "libxml2-0:2.9.13-3.el9_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.13-3.el9_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"product": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"product_id": "python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.13-3.el9_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"product": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"product_id": "libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.13-3.el9_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"product_id": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.13-3.el9_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"product_id": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.13-3.el9_2.7?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"product": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"product_id": "libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.13-3.el9_2.7?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.src as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.src",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux AppStream E4S (v.9.2)",
"product_id": "AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.src as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.src",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64 as a component of Red Hat Enterprise Linux BaseOS E4S (v.9.2)",
"product_id": "BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"relates_to_product_reference": "BaseOS-9.2.0.Z.E4S"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T16:02:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T16:02:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T16:02:55+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"AppStream-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"AppStream-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.src",
"BaseOS-9.2.0.Z.E4S:libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-debugsource-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:libxml2-devel-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-0:2.9.13-3.el9_2.7.x86_64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.aarch64",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.i686",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.ppc64le",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.s390x",
"BaseOS-9.2.0.Z.E4S:python3-libxml2-debuginfo-0:2.9.13-3.el9_2.7.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:12240
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12240",
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12240.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:52+00:00",
"generator": {
"date": "2025-10-30T06:43:52+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:12240",
"initial_release_date": "2025-07-30T07:16:46+00:00",
"revision_history": [
{
"date": "2025-07-30T07:16:46+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T07:16:46+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:52+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_els:7"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.src",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.src",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"product": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"product_id": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-6.el7_9.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"product": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"product_id": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-6.el7_9.10?arch=ppc"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"product": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"product_id": "libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.9.1-6.el7_9.10?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"product": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"product_id": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-6.el7_9.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"product": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"product_id": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.9.1-6.el7_9.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"product": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"product_id": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-6.el7_9.10?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"product": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"product_id": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.9.1-6.el7_9.10?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.s390",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.s390",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"product": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"product_id": "libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-6.el7_9.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"product": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"product_id": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-6.el7_9.10?arch=s390"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390",
"product": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390",
"product_id": "libxml2-static-0:2.9.1-6.el7_9.10.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.9.1-6.el7_9.10?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.s390x",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.s390x",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"product": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"product_id": "libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-6.el7_9.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"product": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"product_id": "libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.9.1-6.el7_9.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"product": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"product_id": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-6.el7_9.10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"product": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"product_id": "libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.9.1-6.el7_9.10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.x86_64",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.x86_64",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"product_id": "libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-6.el7_9.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"product": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"product_id": "libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.9.1-6.el7_9.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-6.el7_9.10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"product": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"product_id": "libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.9.1-6.el7_9.10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.i686",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.i686",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"product": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"product_id": "libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-6.el7_9.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"product_id": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-6.el7_9.10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.9.1-6.el7_9.10.i686",
"product": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.i686",
"product_id": "libxml2-static-0:2.9.1-6.el7_9.10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.9.1-6.el7_9.10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"product": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"product_id": "libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.1-6.el7_9.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"product": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"product_id": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.1-6.el7_9.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"product": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"product_id": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-python@2.9.1-6.el7_9.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"product": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"product_id": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.1-6.el7_9.10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"product": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"product_id": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-static@2.9.1-6.el7_9.10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.src as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.src",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7 ELS)",
"product_id": "7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.src as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.src",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-python-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.i686",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64le as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.s390",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"relates_to_product_reference": "7Server-optional-ELS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-static-0:2.9.1-6.el7_9.10.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 7 ELS)",
"product_id": "7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
},
"product_reference": "libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"relates_to_product_reference": "7Server-optional-ELS"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:16:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-32414",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"discovery_date": "2025-04-08T04:00:51.284113+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358121"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Out-of-Bounds Read in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug affects parsing of text streams using:\n- the Python bindings (pending deprecation: https://gitlab.gnome.org/GNOME/libxml2/-/issues/891)\n- the libxml2 SAX driver drv_libxml2,\n- the XML Reader API\n\nParsing of binary streams is not affected by this vulnerability.\n\nThe vulnerability exists in the libxml2 package the bug arises because of a mismatch between characters vs. bytes handling: functions xmlPythonFileRead and xmlPythonFileReadRaw may compute a length incorrectly (mistaking character count for byte count), but for a succesful exploitation of this bug requires local access, on top of that the path to exploiation is non trivial, where handling of python binding\u0027s and specific input handling of bytes and charcters are required which makes this outside the scope of an attacker and increases the attack complexity, for these reasons this has been marked as moderate by redhat.\n\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-393: Return of Wrong Status Code vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational needs, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to threats in real time, helping prevent or limit exploitation attempts. Robust input validation and error handling ensure all user inputs are thoroughly validated, supporting consistent and secure system responses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32414"
},
{
"category": "external",
"summary": "RHBZ#2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889"
}
],
"release_date": "2025-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:16:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Out-of-Bounds Read in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:16:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:16:46+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.src",
"7Server-optional-ELS:libxml2-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-debuginfo-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-devel-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-python-0:2.9.1-6.el7_9.10.x86_64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.i686",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.ppc64le",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.s390x",
"7Server-optional-ELS:libxml2-static-0:2.9.1-6.el7_9.10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:18218
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.17.42 is now available with\nupdates to packages and images that fix several bugs and add enhancements.\n\n This release includes a security update for Red Hat OpenShift Container\nPlatform 4.17.\n\nRed Hat Product Security has rated this update as having a security impact\nof Important. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing\nKubernetes application platform solution designed for on-premise or private\ncloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container\nPlatform 4.17.42. See the following advisory for the RPM packages for this\nrelease:\n\nhttps://access.redhat.com/errata/155270\n\nSpace precludes documenting all of the container images in this advisory.\nSee the following Release Notes documentation, which will be updated\nshortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nSecurity Fix(es):\n\n* libarchive: Double free at archive_read_format_rar_seek_data() in\narchive_read_support_format_rar.c (CVE-2025-5914)\n* unbound: Unbound Cache poisoning (CVE-2025-5994)\n* sqlite: Integer Truncation in SQLite (CVE-2025-6965)\n* podman: Podman kube play command may overwrite host files (CVE-2025-9566)\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS)\n(CVE-2025-49794)\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, acknowledgments, and other related information, refer to the CVE\npage(s) listed in the References section.\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:18218",
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_18218.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.17.42 bug fix and security update",
"tracking": {
"current_release_date": "2025-10-30T06:44:07+00:00",
"generator": {
"date": "2025-10-30T06:44:07+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:18218",
"initial_release_date": "2025-10-22T05:09:35+00:00",
"revision_history": [
{
"date": "2025-10-22T05:09:35+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-22T05:09:35+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:07+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.17",
"product": {
"name": "Red Hat OpenShift Container Platform 4.17",
"product_id": "Red Hat OpenShift Container Platform 4.17",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.17::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.17"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T05:09:35+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"cve": "CVE-2025-5994",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"discovery_date": "2025-07-16T15:01:36.497027+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380949"
}
],
"notes": [
{
"category": "description",
"text": "A cache poisoning flaw was found in Unbound. Resolvers supporting EDNS Client Subnet (ECS) must segregate outgoing queries to accommodate different outgoing ECS information. This issue reopens resolvers to a birthday paradox attack, known as the Rebirthday Attack, which attempts to match the DNS transaction ID with cache non-ECS poisoned replies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound Cache poisoning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is considered Important rather than Moderate because it directly compromises the integrity of DNS caching mechanisms in resolvers supporting EDNS Client Subnet (ECS). The flaw allows an attacker to exploit the birthday paradox by generating a high volume of concurrent queries with different ECS values, thereby increasing the chance of a transaction ID collision with a spoofed response. If the resolver fails to properly segregate cache entries by ECS scope, it may accept and cache a malicious non-ECS response, effectively leading to DNS cache poisoning. Unlike typical poisoning attempts that require precise timing or privileged network positions, this attack can be carried out remotely with a high success rate, especially in resolvers that do not correctly isolate ECS queries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.17"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5994"
},
{
"category": "external",
"summary": "RHBZ#2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt",
"url": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt"
}
],
"release_date": "2025-07-16T14:38:22.738000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T05:09:35+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound Cache poisoning"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.17"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T05:09:35+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Paul Holzinger"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-9566",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-04T15:45:46.448000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393152"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.\n\nBinary-Affected: podman\nUpstream-version-introduced: v4.0.0\nUpstream-version-fixed: v5.6.1",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Podman kube play command may overwrite host files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having the Important severity. This happens because of the consequences of an successful attack and the low complexity (AC:L) on exploiting this vulnerability. Although the attacker cannot control the content written to the target file, depending on which file was targeted, the exploitation of this flaw may lead sensitive data corruption (I:H) and leading the system to crash resulting in a Denial of Service attack (A:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.17"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9566"
},
{
"category": "external",
"summary": "RHBZ#2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T05:09:35+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "workaround",
"details": "Red Hat advises to not run the podman kube play command with untrusted Kubernetes YAML file as input, additionally review the Kubernetes YAML file before running it through podman may help to catch maliciously crafted secretes or volumes that may be used to exploit this vulnerability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "podman: Podman kube play command may overwrite host files"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.17"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T05:09:35+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.17"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T05:09:35+00:00",
"details": "For OpenShift Container Platform 4.17 see the following documentation,\nwhich will be updated shortly for this release, for important instructions\non how to upgrade your cluster and fully apply this asynchronous errata\nupdate:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata\nfor x86_64, s390x, ppc64le, and aarch64 architectures. The image digests\nmay be found at\nhttps://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.17 users are advised to upgrade to these\nupdated packages and images when they are available in the appropriate\nrelease channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.17/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.17"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:18240
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.13.61 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.13.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.13.61. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/155272\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/release_notes\n\nSecurity Fix(es):\n\nNone\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html-single/updating_clusters/index#updating-cluster-within-minor.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:18240",
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_18240.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.13.61 bug fix and security update",
"tracking": {
"current_release_date": "2025-10-30T06:44:09+00:00",
"generator": {
"date": "2025-10-30T06:44:09+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:18240",
"initial_release_date": "2025-10-23T17:46:13+00:00",
"revision_history": [
{
"date": "2025-10-23T17:46:13+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-23T17:46:13+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:09+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.13",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13",
"product_id": "Red Hat OpenShift Container Platform 4.13",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.13::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5994",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"discovery_date": "2025-07-16T15:01:36.497027+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380949"
}
],
"notes": [
{
"category": "description",
"text": "A cache poisoning flaw was found in Unbound. Resolvers supporting EDNS Client Subnet (ECS) must segregate outgoing queries to accommodate different outgoing ECS information. This issue reopens resolvers to a birthday paradox attack, known as the Rebirthday Attack, which attempts to match the DNS transaction ID with cache non-ECS poisoned replies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound Cache poisoning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is considered Important rather than Moderate because it directly compromises the integrity of DNS caching mechanisms in resolvers supporting EDNS Client Subnet (ECS). The flaw allows an attacker to exploit the birthday paradox by generating a high volume of concurrent queries with different ECS values, thereby increasing the chance of a transaction ID collision with a spoofed response. If the resolver fails to properly segregate cache entries by ECS scope, it may accept and cache a malicious non-ECS response, effectively leading to DNS cache poisoning. Unlike typical poisoning attempts that require precise timing or privileged network positions, this attack can be carried out remotely with a high success rate, especially in resolvers that do not correctly isolate ECS queries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.13"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5994"
},
{
"category": "external",
"summary": "RHBZ#2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt",
"url": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt"
}
],
"release_date": "2025-07-16T14:38:22.738000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T17:46:13+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/release_notes\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x86_64_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html-single/updating_clusters/index#updating-cluster-within-minor.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound Cache poisoning"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.13"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T17:46:13+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/release_notes\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x86_64_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html-single/updating_clusters/index#updating-cluster-within-minor.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Paul Holzinger"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-9566",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-04T15:45:46.448000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393152"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.\n\nBinary-Affected: podman\nUpstream-version-introduced: v4.0.0\nUpstream-version-fixed: v5.6.1",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Podman kube play command may overwrite host files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having the Important severity. This happens because of the consequences of an successful attack and the low complexity (AC:L) on exploiting this vulnerability. Although the attacker cannot control the content written to the target file, depending on which file was targeted, the exploitation of this flaw may lead sensitive data corruption (I:H) and leading the system to crash resulting in a Denial of Service attack (A:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.13"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9566"
},
{
"category": "external",
"summary": "RHBZ#2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T17:46:13+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/release_notes\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x86_64_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html-single/updating_clusters/index#updating-cluster-within-minor.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"category": "workaround",
"details": "Red Hat advises to not run the podman kube play command with untrusted Kubernetes YAML file as input, additionally review the Kubernetes YAML file before running it through podman may help to catch maliciously crafted secretes or volumes that may be used to exploit this vulnerability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "podman: Podman kube play command may overwrite host files"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.13"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T17:46:13+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/release_notes\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x86_64_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html-single/updating_clusters/index#updating-cluster-within-minor.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.13"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-23T17:46:13+00:00",
"details": "For OpenShift Container Platform 4.13 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html/release_notes\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\n The sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x86_64_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.13 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.13/html-single/updating_clusters/index#updating-cluster-within-minor.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.13"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:12241
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libxml2 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support and Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Out-of-Bounds Read in libxml2 (CVE-2025-32414)\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:12241",
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_12241.json"
}
],
"title": "Red Hat Security Advisory: libxml2 security update",
"tracking": {
"current_release_date": "2025-10-30T06:43:54+00:00",
"generator": {
"date": "2025-10-30T06:43:54+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:12241",
"initial_release_date": "2025-07-30T07:10:57+00:00",
"revision_history": [
{
"date": "2025-07-30T07:10:57+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-07-30T07:10:57+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:43:54+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_aus:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_aus:8.4::baseos"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:rhel_eus_long_life:8.4::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product": {
"name": "Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:rhel_eus_long_life:8.4::baseos"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"product": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"product_id": "libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-9.el8_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"product": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"product_id": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-9.el8_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"product_id": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-9.el8_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-9.el8_4.6?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-9.el8_4.6.i686",
"product": {
"name": "libxml2-0:2.9.7-9.el8_4.6.i686",
"product_id": "libxml2-0:2.9.7-9.el8_4.6.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-9.el8_4.6?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"product": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"product_id": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-devel@2.9.7-9.el8_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"product": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"product_id": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debugsource@2.9.7-9.el8_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"product": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"product_id": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2-debuginfo@2.9.7-9.el8_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"product": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"product_id": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2-debuginfo@2.9.7-9.el8_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libxml2-0:2.9.7-9.el8_4.6.x86_64",
"product": {
"name": "libxml2-0:2.9.7-9.el8_4.6.x86_64",
"product_id": "libxml2-0:2.9.7-9.el8_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-9.el8_4.6?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"product": {
"name": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"product_id": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/python3-libxml2@2.9.7-9.el8_4.6?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-0:2.9.7-9.el8_4.6.src",
"product": {
"name": "libxml2-0:2.9.7-9.el8_4.6.src",
"product_id": "libxml2-0:2.9.7-9.el8_4.6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libxml2@2.9.7-9.el8_4.6?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.src as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream AUS (v.8.4)",
"product_id": "AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.src as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.src",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux AppStream EUS EXTENSION (v.8.4)",
"product_id": "AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "AppStream-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.src as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS AUS (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.AUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.src as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.src",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64 as a component of Red Hat Enterprise Linux BaseOS EUS EXTENSION (v.8.4)",
"product_id": "BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
},
"product_reference": "python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"relates_to_product_reference": "BaseOS-8.4.0.Z.EUS.EXTENSION"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:10:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-32414",
"cwe": {
"id": "CWE-393",
"name": "Return of Wrong Status Code"
},
"discovery_date": "2025-04-08T04:00:51.284113+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2358121"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2. This vulnerability allows out-of-bounds memory access due to incorrect handling of return values in xmlPythonFileRead and xmlPythonFileReadRaw. This is caused by a mismatch between the length of the file in bytes vs the length in characters, as unicode characters can occupy up to 4 bytes per character.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Out-of-Bounds Read in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This bug affects parsing of text streams using:\n- the Python bindings (pending deprecation: https://gitlab.gnome.org/GNOME/libxml2/-/issues/891)\n- the libxml2 SAX driver drv_libxml2,\n- the XML Reader API\n\nParsing of binary streams is not affected by this vulnerability.\n\nThe vulnerability exists in the libxml2 package the bug arises because of a mismatch between characters vs. bytes handling: functions xmlPythonFileRead and xmlPythonFileReadRaw may compute a length incorrectly (mistaking character count for byte count), but for a succesful exploitation of this bug requires local access, on top of that the path to exploiation is non trivial, where handling of python binding\u0027s and specific input handling of bytes and charcters are required which makes this outside the scope of an attacker and increases the attack complexity, for these reasons this has been marked as moderate by redhat.\n\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-393: Return of Wrong Status Code vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational needs, while baseline configurations maintain secure system and software states. A defense-in-depth monitoring strategy includes perimeter firewalls and endpoint protection services that detect and respond to threats in real time, helping prevent or limit exploitation attempts. Robust input validation and error handling ensure all user inputs are thoroughly validated, supporting consistent and secure system responses.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-32414"
},
{
"category": "external",
"summary": "RHBZ#2358121",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2358121"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-32414"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/889"
}
],
"release_date": "2025-04-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:10:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Out-of-Bounds Read in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:10:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-30T07:10:57+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"AppStream-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.AUS:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.AUS:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.src",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-debugsource-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:libxml2-devel-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-0:2.9.7-9.el8_4.6.x86_64",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.i686",
"BaseOS-8.4.0.Z.EUS.EXTENSION:python3-libxml2-debuginfo-0:2.9.7-9.el8_4.6.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:19020
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2 is now available.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products and packaged under Red Hat JBoss Core Services, to allow for faster distribution of updates and for a more consistent update experience.\n\nThis release of Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 2 serves as a replacement for Red Hat JBoss Core Services Apache HTTP Server 2.4.62 Service Pack 1, and includes bug fixes and enhancements, which are documented in the Release Notes linked to in the References section.\n\nSecurity Fix(es):\n\n* expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing [jbcs-httpd-2.4] (CVE-2025-59375)\n* libxml2: Heap use after free (UAF) leads to Denial of service (DoS) [jbcs-httpd-2.4] (CVE-2025-49794)\n* libxml2: Null pointer dereference leads to Denial of service (DoS) [jbcs-httpd-2.4] (CVE-2025-49795)\n* libxml2: Type confusion leads to Denial of service (DoS) [jbcs-httpd-2.4] (CVE-2025-49796)\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 [jbcs-httpd-2.4] (CVE-2025-6021)\n\nA Red Hat Security Bulletin which addresses further details about this flaw is available in the References section.\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:19020",
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_2_release_notes/index",
"url": "https://docs.redhat.com/en/documentation/red_hat_jboss_core_services/2.4.62/html/red_hat_jboss_core_services_apache_http_server_2.4.62_service_pack_2_release_notes/index"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "2395108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395108"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_19020.json"
}
],
"title": "Red Hat Security Advisory: Red Hat JBoss Core Services Apache HTTP Server 2.4.62 SP2 security update",
"tracking": {
"current_release_date": "2025-11-01T00:41:25+00:00",
"generator": {
"date": "2025-11-01T00:41:25+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:19020",
"initial_release_date": "2025-10-27T17:46:24+00:00",
"revision_history": [
{
"date": "2025-10-27T17:46:24+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-27T17:46:24+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-01T00:41:25+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat JBoss Core Services 2.4.62.SP2",
"product": {
"name": "Red Hat JBoss Core Services 2.4.62.SP2",
"product_id": "Red Hat JBoss Core Services 2.4.62.SP2",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:jboss_core_services:1"
}
}
}
],
"category": "product_family",
"name": "Red Hat JBoss Core Services"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-27T17:46:24+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-27T17:46:24+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49795",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-12T00:31:08.194000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372379"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Null pointer dereference leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important rather than Moderate due to its triggerability through untrusted input and impact on availability in a widely-used XML processing library like libxml2, which is often embedded in system-level and server-side applications. Although it is \"just\" a NULL pointer dereference\u2014typically classified as a DoS\u2014the context significantly elevates its severity. libxml2 frequently operates in environments that parse external XML content, such as web services, security scanners, and document processors. A crafted XML exploiting malformed XPath in Schematron schemas can reliably crash the application without requiring special privileges or user interaction.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49795"
},
{
"category": "external",
"summary": "RHBZ#2372379",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49795"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-27T17:46:24+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"category": "workaround",
"details": "Mitigation is either unavailable or does not meet Red Hat Product Security standards for usability, deployment, applicability, or stability.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Null pointer dereference leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-27T17:46:24+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-59375",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"discovery_date": "2025-09-15T03:00:59.775098+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2395108"
}
],
"notes": [
{
"category": "description",
"text": "A memory amplification vulnerability in libexpat allows attackers to trigger excessive dynamic memory allocations by submitting specially crafted XML input. A small input (~250 KiB) can cause the parser to allocate hundreds of megabytes, leading to denial-of-service (DoS) through memory exhaustion.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue is Important rather than Critical because, while it allows for significant resource exhaustion leading to denial-of-service (DoS), it does not enable arbitrary code execution, data leakage, or privilege escalation. The vulnerability stems from an uncontrolled memory amplification behavior in libexpat\u2019s parser, where a relatively small XML payload can cause disproportionately large heap allocations. However, the flaw is limited in scope to service disruption and requires the attacker to submit a crafted XML document\u2014something that can be mitigated with proper input validation and memory usage limits. Therefore, while the exploitability is high, the impact is confined to availability, not confidentiality or integrity, making it a high-severity but not critical flaw.\n\nIn Firefox and Thunderbird, where libexpat is a transitive userspace dependency, exploitation usually just crashes the application (app-level DoS), so it is classify as Moderate instead of Important.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-59375"
},
{
"category": "external",
"summary": "RHBZ#2395108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2395108"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-59375"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74",
"url": "https://github.com/libexpat/libexpat/blob/676a4c531ec768732fac215da9730b5f50fbd2bf/expat/Changes#L45-L74"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/issues/1018",
"url": "https://github.com/libexpat/libexpat/issues/1018"
},
{
"category": "external",
"summary": "https://github.com/libexpat/libexpat/pull/1034",
"url": "https://github.com/libexpat/libexpat/pull/1034"
},
{
"category": "external",
"summary": "https://issues.oss-fuzz.com/issues/439133977",
"url": "https://issues.oss-fuzz.com/issues/439133977"
}
],
"release_date": "2025-09-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-27T17:46:24+00:00",
"details": "Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on.\n\nThe References section of this erratum contains a download link. You must be logged in to download the update.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"category": "workaround",
"details": "To mitigate the issue, limit XML input size and complexity before parsing, and avoid accepting compressed or deeply nested XML. Use OS-level resource controls (like ulimit or setrlimit()) to cap memory usage, or run the parser in a sandboxed or isolated process with strict memory and CPU limits. This helps prevent denial-of-service by containing excessive resource consumption.",
"product_ids": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"Red Hat JBoss Core Services 2.4.62.SP2"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "expat: libexpat in Expat allows attackers to trigger large dynamic memory allocations via a small document that is submitted for parsing"
}
]
}
rhsa-2025:13335
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Initial GA Release of Red Hat Insights proxy",
"title": "Topic"
},
{
"category": "general",
"text": "The Insights proxy Container is used by the Insights proxy product RPM and serves as an intermediary between cystomer systems in disconnected networks, air-gapped systems or systems with no outside connections and Insights.\nThe Insights proxy routes all Red Hat Insights traffic through itself, providing a layer of privary and security for disconnected customer systems.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:13335",
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-52533",
"url": "https://access.redhat.com/security/cve/CVE-2024-52533"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4373",
"url": "https://access.redhat.com/security/cve/CVE-2025-4373"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-49794",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-49796",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6021",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6965",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-7425",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-8058",
"url": "https://access.redhat.com/security/cve/CVE-2025-8058"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_13335.json"
}
],
"title": "Red Hat Security Advisory: Insights proxy Container Image",
"tracking": {
"current_release_date": "2025-10-30T05:42:44+00:00",
"generator": {
"date": "2025-10-30T05:42:44+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:13335",
"initial_release_date": "2025-08-07T07:50:20+00:00",
"revision_history": [
{
"date": "2025-08-07T07:50:20+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-08-07T07:50:23+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T05:42:44+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Insights proxy 1.5",
"product": {
"name": "Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:insights_proxy:1.5::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Insights proxy"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"product": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"product_id": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"product_identification_helper": {
"purl": "pkg:oci/insights-proxy-container-rhel9@sha256%3Ac26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7?arch=amd64\u0026repository_url=registry.redhat.io/insights-proxy\u0026tag=1.5.5-1754504343"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64",
"product": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64",
"product_id": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64",
"product_identification_helper": {
"purl": "pkg:oci/insights-proxy-container-rhel9@sha256%3Ae54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d?arch=arm64\u0026repository_url=registry.redhat.io/insights-proxy\u0026tag=1.5.5-1754504343"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64 as a component of Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64"
},
"product_reference": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"relates_to_product_reference": "Red Hat Insights proxy 1.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64 as a component of Red Hat Insights proxy 1.5",
"product_id": "Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
},
"product_reference": "registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64",
"relates_to_product_reference": "Red Hat Insights proxy 1.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-52533",
"cwe": {
"id": "CWE-193",
"name": "Off-by-one Error"
},
"discovery_date": "2024-11-11T23:00:48.125765+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2325340"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Glib library. A buffer overflow condition can be triggered in certain conditions due to an off-by-one error in SOCKS4_CONN_MSG_LEN. This issue may lead to an application crash or other undefined behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: buffer overflow in set_connect_msg()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-52533"
},
{
"category": "external",
"summary": "RHBZ#2325340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2325340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-52533",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-52533"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3461",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3461"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1",
"url": "https://gitlab.gnome.org/GNOME/glib/-/releases/2.82.1"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home",
"url": "https://gitlab.gnome.org/Teams/Releng/security/-/wikis/home"
}
],
"release_date": "2024-11-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: buffer overflow in set_connect_msg()"
},
{
"cve": "CVE-2025-4373",
"cwe": {
"id": "CWE-124",
"name": "Buffer Underwrite (\u0027Buffer Underflow\u0027)"
},
"discovery_date": "2025-05-06T00:33:30.003000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2364265"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in GLib, which is vulnerable to an integer overflow in the g_string_insert_unichar() function. When the position at which to insert the character is large, the position will overflow, leading to a buffer underwrite.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to the successful exploitation of a CWE-124: Buffer Underwrite (\u0027Buffer Underflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nSecure baseline configurations enforce strict memory handling policies, while change controls ensure any deviations are reviewed and approved. Least functionality reduces the attack surface by disabling unnecessary features that could introduce memory risks. Process isolation contains faults within individual workloads, minimizing broader impact. Real-time monitoring and malicious code protection detect and respond to abnormal memory behavior or exploitation attempts. Hardened configuration settings restrict low-level memory access, lowering the likelihood of unsafe operations. Finally, the platform uses memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against buffer underwrite exploits.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4373"
},
{
"category": "external",
"summary": "RHBZ#2364265",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2364265"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4373",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4373"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/glib/-/issues/3677",
"url": "https://gitlab.gnome.org/GNOME/glib/-/issues/3677"
}
],
"release_date": "2025-05-06T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "Currently, no mitigation is available for this vulnerability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glib: Buffer Underflow on GLib through glib/gstring.c via function g_string_insert_unichar"
},
{
"acknowledgments": [
{
"names": [
"Ahmed Lekssays"
]
}
],
"cve": "CVE-2025-6021",
"cwe": {
"id": "CWE-121",
"name": "Stack-based Buffer Overflow"
},
"discovery_date": "2025-06-12T07:55:45.428000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372406"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it\u2019s a write overflow, modern mitigations make remote code execution unlikely.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "RHBZ#2372406",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"
}
],
"release_date": "2025-06-12T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options don\u0027t meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Sergei Glazunov"
],
"organization": "Google Project Zero"
}
],
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-07-10T09:37:28.172000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This heap-use-after-free vulnerability in libxslt is rated Important because it can lead to memory corruption and application crashes. The flaw arises when internal attribute metadata (atype) is modified by libxslt\u0027s xsltSetSourceNodeFlags() function during processing of result tree fragments. If the flag corruption prevents proper removal of ID references, later memory cleanup routines may operate on already-freed memory. Since libxslt is commonly used in server-side XML processing, this could result in denial-of-service or potentially facilitate code execution under certain memory reuse conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "RHBZ#2379274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
}
],
"release_date": "2025-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr"
},
{
"cve": "CVE-2025-8058",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-07-23T20:00:41.541234+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2383146"
}
],
"notes": [
{
"category": "description",
"text": "A double-free vulnerability has been discovered in glibc (GNU C Library). This flaw occurs during bracket expression parsing within the regcomp function, specifically when a memory allocation failure takes place. Exploitation of a double-free vulnerability can lead to memory corruption, which could enable an attacker to achieve arbitrary code execution or a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "glibc: Double free in glibc",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-415: Double Free vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform enforces hardening guidelines to apply the most restrictive settings necessary for operational requirements. Baseline configurations and system controls ensure secure software configurations, while least functionality reduces the attack surface by enforcing safe memory allocation and deallocation practices, lowering the risk of double-free vulnerabilities. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code while providing real-time visibility into memory usage, reducing the risk of arbitrary code execution. Static code analysis and peer reviews enforce strong input validation and error handling, minimizing the risk of denial-of-service (DoS) attacks. In the event of successful exploitation, process isolation prevents compromised workloads from accessing other processes\u2019 memory, containing the potential impact. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8058"
},
{
"category": "external",
"summary": "RHBZ#2383146",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2383146"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8058",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8058"
},
{
"category": "external",
"summary": "https://sourceware.org/bugzilla/show_bug.cgi?id=33185",
"url": "https://sourceware.org/bugzilla/show_bug.cgi?id=33185"
},
{
"category": "external",
"summary": "https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f",
"url": "https://sourceware.org/git/?p=glibc.git;a=commit;h=3ff17af18c38727b88d9115e536c069e6b5d601f"
}
],
"release_date": "2025-07-23T19:57:17.138000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "glibc: Double free in glibc"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-08-07T07:50:20+00:00",
"details": "The Insights proxy container image provided here is downloaded by the Red Hat Insights proxy product RPM.\nBefore applying this update, make sure all previously released errata relevant to your system have been applied.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7_amd64",
"Red Hat Insights proxy 1.5:registry.redhat.io/insights-proxy/insights-proxy-container-rhel9@sha256:e54a5a5f9d69dd6a03e2bcd845e2202910a188d266d4a79b12c387ceffc36f2d_arm64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:15397
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.20.0 is now available with updates to packages and images that fix several bugs and add enhancements. This release includes a security update for Red Hat OpenShift Container\nPlatform 4.20.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.20.0. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/149403\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/release_notes/\n\nSecurity Fix(es):\n\n* libarchive: Double free at archive_read_format_rar_seek_data() in\narchive_read_support_format_rar.c (CVE-2025-5914)\n* unbound: Unbound Cache poisoning (CVE-2025-5994)\n* podman: podman missing TLS verification (CVE-2025-6032)\n* sqlite: Integer Truncation in SQLite (CVE-2025-6965)\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS)\n(CVE-2025-49794)\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.20 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15397",
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "OCPBUGS-55905",
"url": "https://issues.redhat.com/browse/OCPBUGS-55905"
},
{
"category": "external",
"summary": "OCPBUGS-55906",
"url": "https://issues.redhat.com/browse/OCPBUGS-55906"
},
{
"category": "external",
"summary": "OCPBUGS-56277",
"url": "https://issues.redhat.com/browse/OCPBUGS-56277"
},
{
"category": "external",
"summary": "OCPBUGS-56645",
"url": "https://issues.redhat.com/browse/OCPBUGS-56645"
},
{
"category": "external",
"summary": "OCPBUGS-58117",
"url": "https://issues.redhat.com/browse/OCPBUGS-58117"
},
{
"category": "external",
"summary": "OCPBUGS-59201",
"url": "https://issues.redhat.com/browse/OCPBUGS-59201"
},
{
"category": "external",
"summary": "OCPBUGS-59630",
"url": "https://issues.redhat.com/browse/OCPBUGS-59630"
},
{
"category": "external",
"summary": "OCPBUGS-60099",
"url": "https://issues.redhat.com/browse/OCPBUGS-60099"
},
{
"category": "external",
"summary": "OCPBUGS-60664",
"url": "https://issues.redhat.com/browse/OCPBUGS-60664"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15397.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.20.0 bug fix and security update",
"tracking": {
"current_release_date": "2025-10-30T06:44:02+00:00",
"generator": {
"date": "2025-10-30T06:44:02+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:15397",
"initial_release_date": "2025-10-21T14:50:28+00:00",
"revision_history": [
{
"date": "2025-10-21T14:50:28+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-21T14:50:28+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:02+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.20",
"product": {
"name": "Red Hat OpenShift Container Platform 4.20",
"product_id": "Red Hat OpenShift Container Platform 4.20",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.20::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.20"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-21T14:50:28+00:00",
"details": "For OpenShift Container Platform 4.20 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1dc76522d1e235b97675b28e977cb8c452f47d39c0eb519cde02114925f91d2\n\n (For s390x architecture)\n The image digest is sha256:bb2b07ca992b8c976341c145ccdcefbd57e946a590efaa5e10d60fc5a2cbe503\n\n (For ppc64le architecture)\n The image digest is sha256:678369ac0a189674b3d9f5779ee7042b39e625ee580579ec302d8899f8ddc613\n\n (For aarch64 architecture)\n The image digest is sha256:791079aeb081a9193cec139ba4dccbafbfc9437b6e5e39d70225b0e6d2f51b34\n\nAll OpenShift Container Platform 4.20 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"cve": "CVE-2025-5994",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"discovery_date": "2025-07-16T15:01:36.497027+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380949"
}
],
"notes": [
{
"category": "description",
"text": "A cache poisoning flaw was found in Unbound. Resolvers supporting EDNS Client Subnet (ECS) must segregate outgoing queries to accommodate different outgoing ECS information. This issue reopens resolvers to a birthday paradox attack, known as the Rebirthday Attack, which attempts to match the DNS transaction ID with cache non-ECS poisoned replies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound Cache poisoning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is considered Important rather than Moderate because it directly compromises the integrity of DNS caching mechanisms in resolvers supporting EDNS Client Subnet (ECS). The flaw allows an attacker to exploit the birthday paradox by generating a high volume of concurrent queries with different ECS values, thereby increasing the chance of a transaction ID collision with a spoofed response. If the resolver fails to properly segregate cache entries by ECS scope, it may accept and cache a malicious non-ECS response, effectively leading to DNS cache poisoning. Unlike typical poisoning attempts that require precise timing or privileged network positions, this attack can be carried out remotely with a high success rate, especially in resolvers that do not correctly isolate ECS queries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.20"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5994"
},
{
"category": "external",
"summary": "RHBZ#2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt",
"url": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt"
}
],
"release_date": "2025-07-16T14:38:22.738000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-21T14:50:28+00:00",
"details": "For OpenShift Container Platform 4.20 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1dc76522d1e235b97675b28e977cb8c452f47d39c0eb519cde02114925f91d2\n\n (For s390x architecture)\n The image digest is sha256:bb2b07ca992b8c976341c145ccdcefbd57e946a590efaa5e10d60fc5a2cbe503\n\n (For ppc64le architecture)\n The image digest is sha256:678369ac0a189674b3d9f5779ee7042b39e625ee580579ec302d8899f8ddc613\n\n (For aarch64 architecture)\n The image digest is sha256:791079aeb081a9193cec139ba4dccbafbfc9437b6e5e39d70225b0e6d2f51b34\n\nAll OpenShift Container Platform 4.20 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound Cache poisoning"
},
{
"acknowledgments": [
{
"names": [
"Paul Holzinger"
],
"organization": "Red Hat Inc.",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-6032",
"cwe": {
"id": "CWE-295",
"name": "Improper Certificate Validation"
},
"discovery_date": "2025-06-12T15:14:34.557000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372501"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in Podman. The podman machine init command fails to verify the TLS certificate when downloading the VM images from an OCI registry. This issue results in a Man In The Middle attack.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: podman missing TLS verification",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "To exploit this flaw, a user needs to download an image from an untrusted OCI registry, specifically, an OCI registry with an invalid TLS certificate. This allows a remote attacker with access to the network path between the registry and the client to perform a Man In the Middle attack.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.20"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6032"
},
{
"category": "external",
"summary": "RHBZ#2372501",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372501"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6032"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6032",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6032"
}
],
"release_date": "2025-06-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-21T14:50:28+00:00",
"details": "For OpenShift Container Platform 4.20 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1dc76522d1e235b97675b28e977cb8c452f47d39c0eb519cde02114925f91d2\n\n (For s390x architecture)\n The image digest is sha256:bb2b07ca992b8c976341c145ccdcefbd57e946a590efaa5e10d60fc5a2cbe503\n\n (For ppc64le architecture)\n The image digest is sha256:678369ac0a189674b3d9f5779ee7042b39e625ee580579ec302d8899f8ddc613\n\n (For aarch64 architecture)\n The image digest is sha256:791079aeb081a9193cec139ba4dccbafbfc9437b6e5e39d70225b0e6d2f51b34\n\nAll OpenShift Container Platform 4.20 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "workaround",
"details": "Download the VM image manually with another tool that verifies the TLS certificate and then pass the local image as a file path to podman, for example:\n\n# podman machine init --image \u003clocal-image-path\u003e",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "podman: podman missing TLS verification"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.20"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-21T14:50:28+00:00",
"details": "For OpenShift Container Platform 4.20 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1dc76522d1e235b97675b28e977cb8c452f47d39c0eb519cde02114925f91d2\n\n (For s390x architecture)\n The image digest is sha256:bb2b07ca992b8c976341c145ccdcefbd57e946a590efaa5e10d60fc5a2cbe503\n\n (For ppc64le architecture)\n The image digest is sha256:678369ac0a189674b3d9f5779ee7042b39e625ee580579ec302d8899f8ddc613\n\n (For aarch64 architecture)\n The image digest is sha256:791079aeb081a9193cec139ba4dccbafbfc9437b6e5e39d70225b0e6d2f51b34\n\nAll OpenShift Container Platform 4.20 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.20"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-21T14:50:28+00:00",
"details": "For OpenShift Container Platform 4.20 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1dc76522d1e235b97675b28e977cb8c452f47d39c0eb519cde02114925f91d2\n\n (For s390x architecture)\n The image digest is sha256:bb2b07ca992b8c976341c145ccdcefbd57e946a590efaa5e10d60fc5a2cbe503\n\n (For ppc64le architecture)\n The image digest is sha256:678369ac0a189674b3d9f5779ee7042b39e625ee580579ec302d8899f8ddc613\n\n (For aarch64 architecture)\n The image digest is sha256:791079aeb081a9193cec139ba4dccbafbfc9437b6e5e39d70225b0e6d2f51b34\n\nAll OpenShift Container Platform 4.20 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.20"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-21T14:50:28+00:00",
"details": "For OpenShift Container Platform 4.20 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is sha256:d1dc76522d1e235b97675b28e977cb8c452f47d39c0eb519cde02114925f91d2\n\n (For s390x architecture)\n The image digest is sha256:bb2b07ca992b8c976341c145ccdcefbd57e946a590efaa5e10d60fc5a2cbe503\n\n (For ppc64le architecture)\n The image digest is sha256:678369ac0a189674b3d9f5779ee7042b39e625ee580579ec302d8899f8ddc613\n\n (For aarch64 architecture)\n The image digest is sha256:791079aeb081a9193cec139ba4dccbafbfc9437b6e5e39d70225b0e6d2f51b34\n\nAll OpenShift Container Platform 4.20 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.20/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.20"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:18217
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Red Hat OpenShift Container Platform release 4.19.17 is now available with updates to packages and images that fix several bugs and add enhancements.\n\nThis release includes a security update for Red Hat OpenShift Container Platform 4.19.\n\nRed Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability\nfrom the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Red Hat OpenShift Container Platform is Red Hat\u0027s cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments.\n\nThis advisory contains the container images for Red Hat OpenShift Container Platform 4.19.17. See the following advisory for the RPM packages for this release:\n\nhttps://access.redhat.com/errata/155269\n\nSpace precludes documenting all of the container images in this advisory. See the following Release Notes documentation, which will be updated shortly for this release, for details about these changes:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nSecurity Fix(es):\n\n* libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c (CVE-2025-5914)\n* unbound: Unbound Cache poisoning (CVE-2025-5994)\n* sqlite: Integer Truncation in SQLite (CVE-2025-6965)\n* podman: Podman kube play command may overwrite host files (CVE-2025-9566)\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc)\nor web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:18217",
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_18217.json"
}
],
"title": "Red Hat Security Advisory: OpenShift Container Platform 4.19.17 bug fix and security update",
"tracking": {
"current_release_date": "2025-10-30T06:44:06+00:00",
"generator": {
"date": "2025-10-30T06:44:06+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:18217",
"initial_release_date": "2025-10-22T06:20:41+00:00",
"revision_history": [
{
"date": "2025-10-22T06:20:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-22T06:20:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:06+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat OpenShift Container Platform 4.19",
"product": {
"name": "Red Hat OpenShift Container Platform 4.19",
"product_id": "Red Hat OpenShift Container Platform 4.19",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:4.19::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat OpenShift Enterprise"
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T06:20:41+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"cve": "CVE-2025-5994",
"cwe": {
"id": "CWE-349",
"name": "Acceptance of Extraneous Untrusted Data With Trusted Data"
},
"discovery_date": "2025-07-16T15:01:36.497027+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380949"
}
],
"notes": [
{
"category": "description",
"text": "A cache poisoning flaw was found in Unbound. Resolvers supporting EDNS Client Subnet (ECS) must segregate outgoing queries to accommodate different outgoing ECS information. This issue reopens resolvers to a birthday paradox attack, known as the Rebirthday Attack, which attempts to match the DNS transaction ID with cache non-ECS poisoned replies.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "unbound: Unbound Cache poisoning",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is considered Important rather than Moderate because it directly compromises the integrity of DNS caching mechanisms in resolvers supporting EDNS Client Subnet (ECS). The flaw allows an attacker to exploit the birthday paradox by generating a high volume of concurrent queries with different ECS values, thereby increasing the chance of a transaction ID collision with a spoofed response. If the resolver fails to properly segregate cache entries by ECS scope, it may accept and cache a malicious non-ECS response, effectively leading to DNS cache poisoning. Unlike typical poisoning attempts that require precise timing or privileged network positions, this attack can be carried out remotely with a high success rate, especially in resolvers that do not correctly isolate ECS queries.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5994"
},
{
"category": "external",
"summary": "RHBZ#2380949",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380949"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5994"
},
{
"category": "external",
"summary": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt",
"url": "https://nlnetlabs.nl/downloads/unbound/CVE-2025-5994.txt"
}
],
"release_date": "2025-07-16T14:38:22.738000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T06:20:41+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "unbound: Unbound Cache poisoning"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T06:20:41+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Paul Holzinger"
],
"organization": "Red Hat",
"summary": "This issue was discovered by Red Hat."
}
],
"cve": "CVE-2025-9566",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-09-04T15:45:46.448000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2393152"
}
],
"notes": [
{
"category": "description",
"text": "There\u0027s a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file.\n\nBinary-Affected: podman\nUpstream-version-introduced: v4.0.0\nUpstream-version-fixed: v5.6.1",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "podman: Podman kube play command may overwrite host files",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having the Important severity. This happens because of the consequences of an successful attack and the low complexity (AC:L) on exploiting this vulnerability. Although the attacker cannot control the content written to the target file, depending on which file was targeted, the exploitation of this flaw may lead sensitive data corruption (I:H) and leading the system to crash resulting in a Denial of Service attack (A:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-9566"
},
{
"category": "external",
"summary": "RHBZ#2393152",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2393152"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-9566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9566"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-9566"
}
],
"release_date": "2025-09-04T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T06:20:41+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "workaround",
"details": "Red Hat advises to not run the podman kube play command with untrusted Kubernetes YAML file as input, additionally review the Kubernetes YAML file before running it through podman may help to catch maliciously crafted secretes or volumes that may be used to exploit this vulnerability.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "podman: Podman kube play command may overwrite host files"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T06:20:41+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"Red Hat OpenShift Container Platform 4.19"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-22T06:20:41+00:00",
"details": "For OpenShift Container Platform 4.19 see the following documentation, which will be updated shortly for this release, for important instructions on how to upgrade your cluster and fully apply this asynchronous errata update:\n\nhttps://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html/release_notes/\n\nYou may download the oc tool and use it to inspect release image metadata for x86_64, s390x, ppc64le, and aarch64 architectures. The image digests may be found at https://quay.io/repository/openshift-release-dev/ocp-release?tab=tags.\n\nThe sha values for the release are as follows:\n\n (For x86_64 architecture)\n The image digest is {x864_DIGEST}\n\n (For s390x architecture)\n The image digest is {s390x_DIGEST}\n\n (For ppc64le architecture)\n The image digest is {ppc64le_DIGEST}\n\n (For aarch64 architecture)\n The image digest is {aarch64_DIGEST}\n\nAll OpenShift Container Platform 4.19 users are advised to upgrade to these updated packages and images when they are available in the appropriate release channel. To check for available updates, use the OpenShift CLI (oc) or web console. Instructions for upgrading a cluster are available at https://docs.redhat.com/en/documentation/openshift_container_platform/4.19/html-single/updating_clusters/index#updating-cluster-cli.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"Red Hat OpenShift Container Platform 4.19"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:15827
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated web-terminal/tooling container image is now available for Red Hat Web Terminal 1.12 on RHEL 9.",
"title": "Topic"
},
{
"category": "general",
"text": "The Red Hat Web Terminal 1.11 on RHEL 9 web-terminal-tooling container image has been updated to fix the following important CVEs: CVE-2025-5914, CVE-2025-49794, CVE-2025-49796, CVE-2025-6020, CVE-2025-48384, CVE-2025-48385, CVE-2025-7425, CVE-2025-6965, CVE-2025-8941.\n\nUsers of web-terminal/tooling container images are advised to upgrade to this updated image, which contain patches to correct security issues. Users of these images are also encouraged to rebuild all container images that depend on these images.\n\nYou can find images updated by this advisory in Red Hat Container Catalog (see References).",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:15827",
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "2372512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372512"
},
{
"category": "external",
"summary": "2378806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378806"
},
{
"category": "external",
"summary": "2378808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378808"
},
{
"category": "external",
"summary": "2379274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
},
{
"category": "external",
"summary": "2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "2388220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388220"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_15827.json"
}
],
"title": "Red Hat Security Advisory: updated web-terminal/tooling container image",
"tracking": {
"current_release_date": "2025-10-30T06:44:03+00:00",
"generator": {
"date": "2025-10-30T06:44:03+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:15827",
"initial_release_date": "2025-09-15T15:13:16+00:00",
"revision_history": [
{
"date": "2025-09-15T15:13:16+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-09-15T15:13:16+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T06:44:03+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Web Terminal 1.12 on RHEL 9",
"product": {
"name": "Red Hat Web Terminal 1.12 on RHEL 9",
"product_id": "9Base-WebTerminal-1.12",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:webterminal:1.12::el9"
}
}
}
],
"category": "product_family",
"name": "Red Hat Web Terminal"
},
{
"branches": [
{
"category": "product_version",
"name": "web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64",
"product": {
"name": "web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64",
"product_id": "web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64",
"product_identification_helper": {
"purl": "pkg:oci/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413?arch=amd64\u0026repository_url=registry.redhat.io/web-terminal/web-terminal-tooling-rhel9\u0026tag=1.12-4"
}
}
}
],
"category": "architecture",
"name": "amd64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64 as a component of Red Hat Web Terminal 1.12 on RHEL 9",
"product_id": "9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
},
"product_reference": "web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64",
"relates_to_product_reference": "9Base-WebTerminal-1.12"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"acknowledgments": [
{
"names": [
"Olivier BAL-PETRE"
],
"organization": "ANSSI - French Cybersecurity Agency"
}
],
"cve": "CVE-2025-6020",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-12T16:33:01.214000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372512"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "linux-pam: Linux-pam directory Traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in pam_namespace marked as Important rather than Moderate due to its direct impact on privilege boundaries and the ease of exploitation in common configurations. By leveraging symlink attacks or race conditions in polyinstantiated directories under their control, unprivileged local users can escalate to root, compromising the entire system. Since pam_namespace is often used in multi-user environments (e.g., shared systems, terminal servers, containers), a misconfigured or partially protected setup becomes a single point of failure. The attack does not require special capabilities or kernel-level exploits\u2014just timing and control over certain paths\u2014making it both reliable and low-barrier. Moreover, privilege escalation flaws like this can be chained with other vulnerabilities to persist or evade detection, further amplifying the risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6020"
},
{
"category": "external",
"summary": "RHBZ#2372512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372512"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6020"
}
],
"release_date": "2025-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "Disable the `pam_namespace` module if it is not essential for your environment, or carefully review and configure it to avoid operating on any directories or paths that can be influenced or controlled by unprivileged users, such as user home directories or world-writable locations like `/tmp`.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "linux-pam: Linux-pam directory Traversal"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Sergei Glazunov"
],
"organization": "Google Project Zero"
}
],
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-07-10T09:37:28.172000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This heap-use-after-free vulnerability in libxslt is rated Important because it can lead to memory corruption and application crashes. The flaw arises when internal attribute metadata (atype) is modified by libxslt\u0027s xsltSetSourceNodeFlags() function during processing of result tree fragments. If the flag corruption prevents proper removal of ID references, later memory cleanup routines may operate on already-freed memory. Since libxslt is commonly used in server-side XML processing, this could result in denial-of-service or potentially facilitate code execution under certain memory reuse conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "RHBZ#2379274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
}
],
"release_date": "2025-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr"
},
{
"cve": "CVE-2025-8941",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-08-13T12:11:55.270000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \"complete\" fix for CVE-2025-6020.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "linux-pam: Incomplete fix for CVE-2025-6020",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in pam_namespace is rated Important because it allows a local, unprivileged user to escalate privileges to root by exploiting symlink attacks or race conditions in polyinstantiated directories under their control. Successful exploitation requires only the ability to create and manipulate filesystem paths in such directories, without the need for special capabilities or kernel-level vulnerabilities. In multi-user environments\u2014such as shared systems, terminal servers, or certain container deployments, an unprotected or misconfigured pam_namespace configuration can serve as a single point of compromise. Privilege escalation flaws of this nature may also be chained with other vulnerabilities to maintain persistence or evade detection, further increasing the overall impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8941"
},
{
"category": "external",
"summary": "RHBZ#2388220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8941"
}
],
"release_date": "2025-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "Disable the `pam_namespace` module if it is not essential for your environment, or carefully review and configure it to avoid operating on any directories or paths that can be influenced or controlled by unprivileged users, such as user home directories or world-writable locations like `/tmp`.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "linux-pam: Incomplete fix for CVE-2025-6020"
},
{
"cve": "CVE-2025-48384",
"cwe": {
"id": "CWE-59",
"name": "Improper Link Resolution Before File Access (\u0027Link Following\u0027)"
},
"discovery_date": "2025-07-08T19:00:48.297925+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2378806"
}
],
"notes": [
{
"category": "description",
"text": "A line-end handling flaw was found in Git. When writing a config entry, values with a trailing carriage return (CR) are not quoted, resulting in the CR being lost when the config is read later. When initializing a submodule, if the submodule path contains a trailing CR, the altered path is read, resulting in the submodule being checked out to an incorrect location.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: Git arbitrary code execution",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important and not Moderate flaw because it undermines Git\u2019s path and config integrity by allowing carriage return (\\r) injection to manipulate submodule checkout behavior. Git previously failed to quote config values containing trailing CR, causing the value to be misinterpreted when read back. In the context of submodules, this leads to incorrect path resolution, allowing an attacker to redirect the checkout path via a symlink to a sensitive directory like .git/modules/\u003csubmodule\u003e/hooks. If an executable post-checkout hook exists there, it could be inadvertently executed, resulting in arbitrary code execution during submodule operations. This is particularly dangerous in automated CI/CD pipelines or multi-repo projects where submodules are initialized or updated without manual inspection.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48384"
},
{
"category": "external",
"summary": "RHBZ#2378806",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378806"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48384"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48384",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48384"
},
{
"category": "external",
"summary": "https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384",
"url": "https://dgl.cx/2025/07/git-clone-submodule-cve-2025-48384"
},
{
"category": "external",
"summary": "https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89",
"url": "https://github.com/git/git/commit/05e9cd64ee23bbadcea6bcffd6660ed02b8eab89"
},
{
"category": "external",
"summary": "https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9",
"url": "https://github.com/git/git/security/advisories/GHSA-vwqx-4fm8-6qc9"
},
{
"category": "external",
"summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
}
],
"release_date": "2025-07-08T18:23:48.710000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "To mitigate this issue, avoid using --recurse-submodules when cloning repositories from untrusted sources; instead, clone normally and only initialize or update submodules manually after reviewing them.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.0,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "exploit_status",
"date": "2025-08-25T00:00:00+00:00",
"details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog"
},
{
"category": "impact",
"details": "Important"
}
],
"title": "git: Git arbitrary code execution"
},
{
"cve": "CVE-2025-48385",
"cwe": {
"id": "CWE-88",
"name": "Improper Neutralization of Argument Delimiters in a Command (\u0027Argument Injection\u0027)"
},
"discovery_date": "2025-07-08T19:00:55.106787+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2378808"
}
],
"notes": [
{
"category": "description",
"text": "A bundled uri handling flaw was found in Git. When cloning a repository, Git knows to optionally fetch a bundle advertised by the remote server, which allows the server side to offload parts of the clone to a CDN. The Git client does not perform sufficient validation of the advertised bundles, which allows the remote side to perform protocol injection.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "git: Git arbitrary file writes",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability marked as Important rather than a Moderate flaw because it enables protocol injection at the transport layer of Git\u0027s bundle-uri mechanism, allowing a remote server to manipulate how and where data is written on the client system during a clone operation. The lack of input sanitization on user-controlled values like the URI and target path means that malformed inputs containing spaces or newlines can break protocol framing, leading to arbitrary file writes. In scenarios such as CI pipelines, developer environments, or recursive clones with submodules, an attacker can exploit this to overwrite critical files or inject malicious content, potentially achieving remote code execution (RCE).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-48385"
},
{
"category": "external",
"summary": "RHBZ#2378808",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2378808"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-48385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48385"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-48385"
},
{
"category": "external",
"summary": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655",
"url": "https://github.com/git/git/security/advisories/GHSA-m98c-vgpc-9655"
}
],
"release_date": "2025-07-08T18:23:44.405000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 8.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "git: Git arbitrary file writes"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-09-15T15:13:16+00:00",
"details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nFor details on how to apply this update, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"9Base-WebTerminal-1.12:web-terminal/web-terminal-tooling-rhel9@sha256:f43507114dbba2dcb8083c107c0db8a2ffa4834d1250155496f3c23fbaf68413_amd64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
rhsa-2025:18219
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "cert-manager Operator for Red Hat OpenShift 1.16.0",
"title": "Topic"
},
{
"category": "general",
"text": "The cert-manager Operator for Red Hat OpenShift builds on top of Kubernetes, introducing certificate authorities\nand certificates as first-class resource types in the Kubernetes API. This makes it possible to provide\ncertificates-as-a-service to developers working within your Kubernetes cluster.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2025:18219",
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2024-12718",
"url": "https://access.redhat.com/security/cve/CVE-2024-12718"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4138",
"url": "https://access.redhat.com/security/cve/CVE-2025-4138"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-4517",
"url": "https://access.redhat.com/security/cve/CVE-2025-4517"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-49794",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-49796",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-5914",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6020",
"url": "https://access.redhat.com/security/cve/CVE-2025-6020"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-6965",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-7425",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/cve/CVE-2025-8941",
"url": "https://access.redhat.com/security/cve/CVE-2025-8941"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/",
"url": "https://access.redhat.com/security/updates/classification/"
},
{
"category": "external",
"summary": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html",
"url": "https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_18219.json"
}
],
"title": "Red Hat Security Advisory: cert-manager Operator for Red Hat OpenShift 1.16.0",
"tracking": {
"current_release_date": "2025-10-30T05:42:53+00:00",
"generator": {
"date": "2025-10-30T05:42:53+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.10"
}
},
"id": "RHSA-2025:18219",
"initial_release_date": "2025-10-16T08:41:21+00:00",
"revision_history": [
{
"date": "2025-10-16T08:41:21+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2025-10-16T08:41:31+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-30T05:42:53+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "cert-manager operator for Red Hat OpenShift 1.16",
"product": {
"name": "cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:cert_manager:1.16::el9"
}
}
}
],
"category": "product_family",
"name": "cert-manager operator for Red Hat OpenShift"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760515757"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3?arch=amd64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760509690"
}
}
}
],
"category": "architecture",
"name": "amd64"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3Aec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760515757"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07?arch=s390x\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760509690"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3A330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760515757"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340?arch=ppc64le\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760509690"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-rhel9@sha256%3Adf852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760515757"
}
}
},
{
"category": "product_version",
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"product": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"product_id": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"product_identification_helper": {
"purl": "pkg:oci/jetstack-cert-manager-acmesolver-rhel9@sha256%3A768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184?arch=arm64\u0026repository_url=registry.redhat.io/cert-manager\u0026tag=v1.16.5-1760509690"
}
}
}
],
"category": "architecture",
"name": "arm64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64 as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64 as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x as a component of cert-manager operator for Red Hat OpenShift 1.16",
"product_id": "cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
},
"product_reference": "registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x",
"relates_to_product_reference": "cert-manager operator for Red Hat OpenShift 1.16"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12718",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-03T14:00:57.613538+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370013"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in CPython\u0027s tarfile module. This vulnerability allows modification of file metadata, such as timestamps or permissions, outside the intended extraction directory via maliciously crafted tar archives using the filter=\"data\" or filter=\"tar\" extraction filters.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Bypass extraction filter to modify file metadata outside extraction directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The severity of this vulnerability was lowered due to the fact that successful exploitation requires the attacker to convince a privileged user or process to extract a malicious tar file. Since tar file extraction typically occurs in trusted contexts or with elevated privileges, the impact is reduced by the requirement of such access.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2024-12718"
},
{
"category": "external",
"summary": "RHBZ#2370013",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370013"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2024-12718",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-12718"
},
{
"category": "external",
"summary": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f",
"url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/127987",
"url": "https://github.com/python/cpython/issues/127987"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:59:10.908000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cpython: python: Bypass extraction filter to modify file metadata outside extraction directory"
},
{
"cve": "CVE-2025-4138",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-12T09:03:58.434950+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372426"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the Python tarfile module. This vulnerability allows attackers to bypass extraction filters, enabling symlink targets to escape the destination directory and allowing unauthorized modification of file metadata via the use of TarFile.extract() or TarFile.extractall() with the filter= parameter set to \"data\" or \"tar\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Versions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4138"
},
{
"category": "external",
"summary": "RHBZ#2372426",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372426"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4138",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4138"
},
{
"category": "external",
"summary": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f",
"url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:59:02.717000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "Red Hat recommends upgrading to a fixed release of Python as soon as one is available. This vulnerability can be mitigated by rejecting links inside tarfiles that use relative references to the parent directory. The upstream advisory provides this example code:\n\n\u0027\u0027\u0027\n# Avoid insecure segments in link names.\nfor member in tar.getmembers():\n if not member.islnk():\n continue\n if os.pardir in os.path.split(member.linkname):\n raise OSError(\"Tarfile with insecure segment (\u0027..\u0027) in linkname\")\n\n# Now safe to extract members with the data filter.\ntar.extractall(filter=\"data\")\n\u0027\u0027\u0027",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "cpython: python: Bypassing extraction filter to create symlinks to arbitrary targets outside extraction directory"
},
{
"cve": "CVE-2025-4517",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-03T14:01:12.271192+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370016"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in the CPython tarfile module. This vulnerability allows arbitrary filesystem writes outside the extraction directory via extracting untrusted tar archives using the TarFile.extractall() or TarFile.extract() methods with the extraction filter parameter set to \"data\" or \"tar\".",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "python: cpython: Arbitrary writes via tarfile realpath overflow",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The severity of this vulnerability was lowered due to the fact that successful exploitation requires the attacker to convince a privileged user or process to extract a malicious tar file. Since tar file extraction typically occurs in trusted contexts or with elevated privileges, the impact is reduced by the requirement of such access.\n\nVersions of python36:3.6/python36 as shipped with Red Hat Enterprise Linux 8 are marked as \u0027Not affected\u0027 as they just provide \"symlinks\" to the main python3 component, which provides the actual interpreter of the Python programming language.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-4517"
},
{
"category": "external",
"summary": "RHBZ#2370016",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370016"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-4517",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-4517"
},
{
"category": "external",
"summary": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f",
"url": "https://gist.github.com/sethmlarson/52398e33eff261329a0180ac1d54f42f"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a",
"url": "https://github.com/python/cpython/commit/3612d8f51741b11f36f8fb0494d79086bac9390a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a",
"url": "https://github.com/python/cpython/commit/9e0ac76d96cf80b49055f6d6b9a6763fb9215c2a"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/issues/135034",
"url": "https://github.com/python/cpython/issues/135034"
},
{
"category": "external",
"summary": "https://github.com/python/cpython/pull/135037",
"url": "https://github.com/python/cpython/pull/135037"
},
{
"category": "external",
"summary": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/",
"url": "https://mail.python.org/archives/list/security-announce@python.org/thread/MAXIJJCUUMCL7ATZNDVEGGHUMQMUUKLG/"
}
],
"release_date": "2025-06-03T12:58:50.352000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "python: cpython: Arbitrary writes via tarfile realpath overflow"
},
{
"cve": "CVE-2025-5914",
"cwe": {
"id": "CWE-415",
"name": "Double Free"
},
"discovery_date": "2025-06-06T17:58:25.491000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2370861"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability has been identified in the libarchive library, specifically within the archive_read_format_rar_seek_data() function. This flaw involves an integer overflow that can ultimately lead to a double-free condition. Exploiting a double-free vulnerability can result in memory corruption, enabling an attacker to execute arbitrary code or cause a denial-of-service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has rated this vulnerability as Important because it allows a local attacker with limited privileges to trigger a double-free in libarchive\u0027s RAR parser by providing a specially crafted RAR archive. Successful exploitation could result in code execution or application crashes.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-5914"
},
{
"category": "external",
"summary": "RHBZ#2370861",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370861"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5914"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/pull/2598",
"url": "https://github.com/libarchive/libarchive/pull/2598"
},
{
"category": "external",
"summary": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0",
"url": "https://github.com/libarchive/libarchive/releases/tag/v3.8.0"
}
],
"release_date": "2025-05-20T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libarchive: Double free at archive_read_format_rar_seek_data() in archive_read_support_format_rar.c"
},
{
"acknowledgments": [
{
"names": [
"Olivier BAL-PETRE"
],
"organization": "ANSSI - French Cybersecurity Agency"
}
],
"cve": "CVE-2025-6020",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-06-12T16:33:01.214000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372512"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in linux-pam. The module pam_namespace may use access user-controlled paths without proper protection, allowing local users to elevate their privileges to root via multiple symlink attacks and race conditions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "linux-pam: Linux-pam directory Traversal",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in pam_namespace marked as Important rather than Moderate due to its direct impact on privilege boundaries and the ease of exploitation in common configurations. By leveraging symlink attacks or race conditions in polyinstantiated directories under their control, unprivileged local users can escalate to root, compromising the entire system. Since pam_namespace is often used in multi-user environments (e.g., shared systems, terminal servers, containers), a misconfigured or partially protected setup becomes a single point of failure. The attack does not require special capabilities or kernel-level exploits\u2014just timing and control over certain paths\u2014making it both reliable and low-barrier. Moreover, privilege escalation flaws like this can be chained with other vulnerabilities to persist or evade detection, further amplifying the risk.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6020"
},
{
"category": "external",
"summary": "RHBZ#2372512",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372512"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6020",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6020"
}
],
"release_date": "2025-06-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "Disable the `pam_namespace` module if it is not essential for your environment, or carefully review and configure it to avoid operating on any directories or paths that can be influenced or controlled by unprivileged users, such as user home directories or world-writable locations like `/tmp`.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "linux-pam: Linux-pam directory Traversal"
},
{
"cve": "CVE-2025-6965",
"cwe": {
"id": "CWE-197",
"name": "Numeric Truncation Error"
},
"discovery_date": "2025-07-15T14:02:19.241458+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2380149"
}
],
"notes": [
{
"category": "description",
"text": "A memory corruption flaw was found in SQLite. Under specific conditions a query can be generated where the number of aggregate terms could exceed the number of columns available. This issue could lead to memory corruption and subsequent unintended behavior.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "sqlite: Integer Truncation in SQLite",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in SQLite is categorized as Important rather than Critical because, although it involves memory corruption, the conditions required to trigger it are relatively constrained. The flaw arises when a query causes the number of aggregate terms to exceed internal limits, leading to potential buffer overflows or memory mismanagement. However, exploitation requires the ability to craft complex SQL queries and interact with the SQLite engine in a specific manner\u2014typically through direct SQL input. There is no known evidence of arbitrary code execution, privilege escalation, or remote exploitability as a direct result of this flaw. Additionally, most SQLite deployments are embedded in applications where input is tightly controlled or sanitized.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-6965"
},
{
"category": "external",
"summary": "RHBZ#2380149",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2380149"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6965"
},
{
"category": "external",
"summary": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8",
"url": "https://www.sqlite.org/src/info/5508b56fd24016c13981ec280ecdd833007c9d8dd595edb295b984c2b487b5c8"
}
],
"release_date": "2025-07-15T13:44:00.784000+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 7.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:H/A:L",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "sqlite: Integer Truncation in SQLite"
},
{
"acknowledgments": [
{
"names": [
"Sergei Glazunov"
],
"organization": "Google Project Zero"
}
],
"cve": "CVE-2025-7425",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2025-07-10T09:37:28.172000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2379274"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result, the system may access freed memory, causing crashes or enabling attackers to trigger heap corruption.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This heap-use-after-free vulnerability in libxslt is rated Important because it can lead to memory corruption and application crashes. The flaw arises when internal attribute metadata (atype) is modified by libxslt\u0027s xsltSetSourceNodeFlags() function during processing of result tree fragments. If the flag corruption prevents proper removal of ID references, later memory cleanup routines may operate on already-freed memory. Since libxslt is commonly used in server-side XML processing, this could result in denial-of-service or potentially facilitate code execution under certain memory reuse conditions.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-7425"
},
{
"category": "external",
"summary": "RHBZ#2379274",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2379274"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-7425"
},
{
"category": "external",
"summary": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140",
"url": "https://gitlab.gnome.org/GNOME/libxslt/-/issues/140"
}
],
"release_date": "2025-07-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxslt: Heap Use-After-Free in libxslt caused by atype corruption in xmlAttrPtr"
},
{
"cve": "CVE-2025-8941",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"discovery_date": "2025-08-13T12:11:55.270000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2388220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in linux-pam. The pam_namespace module may improperly handle user-controlled paths, allowing local users to exploit symlink attacks and race conditions to elevate their privileges to root. This CVE provides a \"complete\" fix for CVE-2025-6020.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "linux-pam: Incomplete fix for CVE-2025-6020",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability in pam_namespace is rated Important because it allows a local, unprivileged user to escalate privileges to root by exploiting symlink attacks or race conditions in polyinstantiated directories under their control. Successful exploitation requires only the ability to create and manipulate filesystem paths in such directories, without the need for special capabilities or kernel-level vulnerabilities. In multi-user environments\u2014such as shared systems, terminal servers, or certain container deployments, an unprotected or misconfigured pam_namespace configuration can serve as a single point of compromise. Privilege escalation flaws of this nature may also be chained with other vulnerabilities to maintain persistence or evade detection, further increasing the overall impact.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-8941"
},
{
"category": "external",
"summary": "RHBZ#2388220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2388220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-8941",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8941"
}
],
"release_date": "2025-08-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "Disable the `pam_namespace` module if it is not essential for your environment, or carefully review and configure it to avoid operating on any directories or paths that can be influenced or controlled by unprivileged users, such as user home directories or world-writable locations like `/tmp`.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "linux-pam: Incomplete fix for CVE-2025-6020"
},
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"discovery_date": "2025-06-11T21:33:43.044000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372373"
}
],
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue was rated with a severity impact of Important by Red Hat Product Security, as libxml can be used to parse XML coming from the network depending on how the program consumes it and uses the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "RHBZ#2372373",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
}
],
"release_date": "2025-06-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Heap use after free (UAF) leads to Denial of service (DoS)"
},
{
"cve": "CVE-2025-49796",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2025-06-12T00:35:26.470000+00:00",
"flags": [
{
"label": "vulnerable_code_not_present",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
}
],
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2372385"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libxml: Type confusion leads to Denial of service (DoS)",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The Red Hat Product Security team has evaluated this vulnerability as having an Important security impact, as libxml can be used to parse XML from the network depending on how the program consumes it using the library. Additionally, although the initial report shows a crash due to invalid memory access (A:H), other undefined issues that can present data integrity due to the application overwriting sensitive data are not discarded (I:H).",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"known_not_affected": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "RHBZ#2372385",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49796"
}
],
"release_date": "2025-06-11T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2025-10-16T08:41:21+00:00",
"details": "Before applying this update, make sure all previously released errata relevant to your system have been applied.\n\nThe steps to apply the upgraded images are different depending on the installation plan approval policy you used\nwhen installing the cert-manager Operator for Red Hat OpenShift.\n\n- If the approval policy is set to `Automatic`, then the Operator will be upgraded automatically when there is a\nnew version of the Operator. No further action is required to upgrade. This is the default setting.\n\n- If you changed the approval policy to `Manual`, then you must manually approve the upgrade to the Operator.\n\nSee https://docs.openshift.com/container-platform/latest/security/cert_manager_operator/index.html for additional\ninformation.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "workaround",
"details": "There\u0027s no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.",
"product_ids": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:2b91440f3b71bc63e819a3def29e72b31f49878e03fbea67624de6a06925f340_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:691bfc535cb3d22962b0f6dc6fde226b3e70a5d68283ec1846396e3ee0fc7d07_s390x",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:768bd034b3d9e99e0a6c756fcd7d9ec00759c591569f25cd95cc8cb4eb449184_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-acmesolver-rhel9@sha256:8c7a1ae39e07d9a0d578e1f62df4f05ab54cefe058595077403a9d9bbd0ce8e3_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b_amd64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323_ppc64le",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:df852ad92734bc087e213e6c7075daf6d7010db4ab72919649736804e295a6a2_arm64",
"cert-manager operator for Red Hat OpenShift 1.16:registry.redhat.io/cert-manager/jetstack-cert-manager-rhel9@sha256:ec9c6b34a40da29f3ee89b361d94879025a998d34309bf3b63c555f3c225eb16_s390x"
]
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "libxml: Type confusion leads to Denial of service (DoS)"
}
]
}
wid-sec-w-2025-1905
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "IBM QRadar Security Information and Event Management (SIEM) bietet Unterst\u00fctzung bei der Erkennung und Priorisierung von Sicherheitsbedrohungen im Unternehmen.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in IBM QRadar SIEM Komponenten ausnutzen, um Daten zu manipulieren, um einen Denial of Service Angriff durchzuf\u00fchren, um beliebigen Programmcode auszuf\u00fchren, um Sicherheitsvorkehrungen zu umgehen, und um Informationen offenzulegen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1905 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1905.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1905 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1905"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7243011 vom 2025-08-25",
"url": "https://www.ibm.com/support/pages/node/7243011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14746 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14746"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14748 vom 2025-08-27",
"url": "https://access.redhat.com/errata/RHSA-2025:14748"
}
],
"source_lang": "en-US",
"title": "IBM QRadar SIEM Komponente: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-08-27T22:00:00.000+00:00",
"generator": {
"date": "2025-08-28T05:52:03.530+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1905",
"initial_release_date": "2025-08-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-08-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP13 IF01",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP13 IF01",
"product_id": "T046492"
}
},
{
"category": "product_version",
"name": "7.5.0 UP13 IF01",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP13 IF01",
"product_id": "T046492-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up13_if01"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2019-17543",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2019-17543"
},
{
"cve": "CVE-2019-5427",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2019-5427"
},
{
"cve": "CVE-2020-5260",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2020-5260"
},
{
"cve": "CVE-2022-49058",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2022-49058"
},
{
"cve": "CVE-2022-49111",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2022-49111"
},
{
"cve": "CVE-2022-49136",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2022-49136"
},
{
"cve": "CVE-2022-49788",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2022-49788"
},
{
"cve": "CVE-2022-49846",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2022-49846"
},
{
"cve": "CVE-2022-49977",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2022-49977"
},
{
"cve": "CVE-2022-50020",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2022-50020"
},
{
"cve": "CVE-2024-23337",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-23337"
},
{
"cve": "CVE-2024-28956",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-28956"
},
{
"cve": "CVE-2024-34397",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-34397"
},
{
"cve": "CVE-2024-43420",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-43420"
},
{
"cve": "CVE-2024-45332",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-45332"
},
{
"cve": "CVE-2024-50154",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-50154"
},
{
"cve": "CVE-2024-50349",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-50349"
},
{
"cve": "CVE-2024-52006",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-52006"
},
{
"cve": "CVE-2024-52533",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-52533"
},
{
"cve": "CVE-2024-53920",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-53920"
},
{
"cve": "CVE-2024-54661",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-54661"
},
{
"cve": "CVE-2024-57980",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-57980"
},
{
"cve": "CVE-2024-58002",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-58002"
},
{
"cve": "CVE-2024-6531",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2024-6531"
},
{
"cve": "CVE-2025-20012",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-20012"
},
{
"cve": "CVE-2025-20623",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-20623"
},
{
"cve": "CVE-2025-21905",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-21905"
},
{
"cve": "CVE-2025-21919",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-21919"
},
{
"cve": "CVE-2025-21928",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-21928"
},
{
"cve": "CVE-2025-21991",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-21991"
},
{
"cve": "CVE-2025-22004",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-22004"
},
{
"cve": "CVE-2025-22020",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-22020"
},
{
"cve": "CVE-2025-23150",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-23150"
},
{
"cve": "CVE-2025-24495",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-24495"
},
{
"cve": "CVE-2025-27613",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-27613"
},
{
"cve": "CVE-2025-27614",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-27614"
},
{
"cve": "CVE-2025-32415",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-32415"
},
{
"cve": "CVE-2025-37738",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-37738"
},
{
"cve": "CVE-2025-37890",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-37890"
},
{
"cve": "CVE-2025-38052",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-38052"
},
{
"cve": "CVE-2025-38079",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-38079"
},
{
"cve": "CVE-2025-38086",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-38086"
},
{
"cve": "CVE-2025-4373",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-4373"
},
{
"cve": "CVE-2025-46835",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-46835"
},
{
"cve": "CVE-2025-47273",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-47273"
},
{
"cve": "CVE-2025-48060",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-48060"
},
{
"cve": "CVE-2025-48384",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-48384"
},
{
"cve": "CVE-2025-48385",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-48385"
},
{
"cve": "CVE-2025-49794",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49796",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-52434",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-52434"
},
{
"cve": "CVE-2025-52520",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-52520"
},
{
"cve": "CVE-2025-53506",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-53506"
},
{
"cve": "CVE-2025-55668",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-55668"
},
{
"cve": "CVE-2025-6021",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6965",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-6965"
},
{
"cve": "CVE-2025-7425",
"product_status": {
"known_affected": [
"67646",
"T046492"
]
},
"release_date": "2025-08-25T22:00:00.000+00:00",
"title": "CVE-2025-7425"
}
]
}
wid-sec-w-2025-1312
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libxml ist ein C Parser und Toolkit, welches f\u00fcr das Gnome Projekt entwickelt wurde.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libxml2 ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren oder nicht n\u00e4her beschriebene Auswirkungen zu erzielen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-1312 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-1312.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-1312 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-1312"
},
{
"category": "external",
"summary": "GNOME Security vom 2025-06-11",
"url": "https://gitlab.gnome.org/Teams/Releng/security/-/wikis/2025"
},
{
"category": "external",
"summary": "GNOME GitLab Issue 926 vom 2025-06-11",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/926"
},
{
"category": "external",
"summary": "GNOME GitLab Issue 931 vom 2025-06-11",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/931"
},
{
"category": "external",
"summary": "GNOME GitLab Issue 932 vom 2025-06-11",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/932"
},
{
"category": "external",
"summary": "GNOME GitLab Issue 933 vom 2025-06-11",
"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/933"
},
{
"category": "external",
"summary": "Arch Linux Security Advisory ASA-202506-7 vom 2025-06-19",
"url": "https://security.archlinux.org/ASA-202506-7"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2893 vom 2025-06-24",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2893.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2893 vom 2025-06-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2893.html"
},
{
"category": "external",
"summary": "Tenable Security Advisory TNS-2025-13 vom 2025-06-30",
"url": "https://de.tenable.com/security/tns-2025-13"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10630 vom 2025-07-08",
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15321-1 vom 2025-07-09",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6ENYT3VR7R5DYMOUMVW7VUSFZWAHIP53/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02260-1 vom 2025-07-09",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021778.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10698 vom 2025-07-09",
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:10699 vom 2025-07-09",
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-10630 vom 2025-07-09",
"url": "https://linux.oracle.com/errata/ELSA-2025-10630.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-10699 vom 2025-07-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-10699.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-10698 vom 2025-07-10",
"url": "https://linux.oracle.com/errata/ELSA-2025-10698.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02275-1 vom 2025-07-10",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021788.html"
},
{
"category": "external",
"summary": "NetApp Security Advisory NTAP-20250711-0009 vom 2025-07-11",
"url": "https://security.netapp.com/advisory/NTAP-20250711-0009"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02294-1 vom 2025-07-11",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021799.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02314-1 vom 2025-07-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7239960 vom 2025-07-17",
"url": "https://www.ibm.com/support/pages/node/7239960"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11386 vom 2025-07-17",
"url": "https://access.redhat.com/errata/RHSA-2025:11386"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:02355-1 vom 2025-07-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021844.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11396 vom 2025-07-18",
"url": "https://access.redhat.com/errata/RHSA-2025:11396"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11580 vom 2025-07-23",
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11673 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:11673"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12099 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12098 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12199 vom 2025-07-29",
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12237 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12240 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12241 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:12239 vom 2025-07-30",
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-2938 vom 2025-07-30",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-2938.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12450 vom 2025-08-01",
"url": "https://linux.oracle.com/errata/ELSA-2025-12450.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-13203 vom 2025-08-07",
"url": "http://linux.oracle.com/errata/ELSA-2025-13203.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7241565 vom 2025-08-06",
"url": "https://www.ibm.com/support/pages/node/7241565"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13335 vom 2025-08-07",
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7242015 vom 2025-08-12",
"url": "https://www.ibm.com/support/pages/node/7242015"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13336 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13336"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13325 vom 2025-08-13",
"url": "https://access.redhat.com/errata/RHSA-2025:13325"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2025-12240 vom 2025-08-14",
"url": "https://linux.oracle.com/errata/ELSA-2025-12240.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:13289 vom 2025-08-14",
"url": "https://access.redhat.com/errata/RHSA-2025:13289"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7694-1 vom 2025-08-20",
"url": "https://ubuntu.com/security/notices/USN-7694-1"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14059 vom 2025-08-28",
"url": "https://access.redhat.com/errata/RHSA-2025:14059"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:14396 vom 2025-08-28",
"url": "https://access.redhat.com/errata/RHSA-2025:14396"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20564-1 vom 2025-08-28",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20607-1 vom 2025-08-29",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022361.html"
},
{
"category": "external",
"summary": "PDFreactor Release Notes vom 2025-09-05",
"url": "https://www.pdfreactor.com/pdfreactor-12-3-now-available/"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7244160 vom 2025-09-05",
"url": "https://www.ibm.com/support/pages/node/7244160"
},
{
"category": "external",
"summary": "Hitachi Cybersecurity Advisory vom 2025-09-09",
"url": "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000220\u0026LanguageCode=en\u0026DocumentPartId=\u0026Action=launch"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7244361 vom 2025-09-09",
"url": "https://www.ibm.com/support/pages/node/7244361"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15308 vom 2025-09-11",
"url": "https://access.redhat.com/errata/RHSA-2025:15308"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15827 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15828 vom 2025-09-15",
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15672 vom 2025-09-18",
"url": "https://access.redhat.com/errata/RHSA-2025:15672"
},
{
"category": "external",
"summary": "fluent-package v5.0.8 release vom 2025-10-08",
"url": "https://www.fluentd.org/blog/fluent-package-v5.0.8-has-been-released"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18219 vom 2025-10-16",
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18217 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18218 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:15397 vom 2025-10-22",
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:18240 vom 2025-10-23",
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19020 vom 2025-10-27",
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19046 vom 2025-10-29",
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:19041 vom 2025-10-30",
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
}
],
"source_lang": "en-US",
"title": "libxml2: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2025-10-29T23:00:00.000+00:00",
"generator": {
"date": "2025-10-30T08:13:55.785+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2025-1312",
"initial_release_date": "2025-06-11T22:00:00.000+00:00",
"revision_history": [
{
"date": "2025-06-11T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-06-12T22:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: 2372385"
},
{
"date": "2025-06-19T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Arch Linux aufgenommen"
},
{
"date": "2025-06-24T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon und Tenable aufgenommen"
},
{
"date": "2025-07-08T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-09T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von openSUSE, SUSE, Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2025-07-10T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-13T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von NetApp und SUSE aufgenommen"
},
{
"date": "2025-07-15T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-07-17T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von IBM, Red Hat und SUSE aufgenommen"
},
{
"date": "2025-07-20T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-22T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-28T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-29T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-07-31T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2025-08-06T22:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Oracle Linux und IBM aufgenommen"
},
{
"date": "2025-08-07T22:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-11T22:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-08-12T22:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-13T22:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen"
},
{
"date": "2025-08-19T22:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-08-27T22:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-08-31T22:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-09-07T22:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-09-08T22:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-09-09T22:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-09-11T22:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-15T22:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-09-17T22:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-07T22:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates aufgenommen"
},
{
"date": "2025-10-16T22:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-21T22:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-23T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-27T23:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-28T23:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-10-29T23:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "38"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Hitachi Energy RTU500",
"product": {
"name": "Hitachi Energy RTU500",
"product_id": "T027844",
"product_identification_helper": {
"cpe": "cpe:/h:abb:rtu500:-"
}
}
}
],
"category": "vendor",
"name": "Hitachi Energy"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "7.3",
"product": {
"name": "IBM AIX 7.3",
"product_id": "1139691",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.3"
}
}
},
{
"category": "product_version",
"name": "7.2",
"product": {
"name": "IBM AIX 7.2",
"product_id": "434967",
"product_identification_helper": {
"cpe": "cpe:/o:ibm:aix:7.2"
}
}
}
],
"category": "product_name",
"name": "AIX"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cLTS 12.0.14",
"product": {
"name": "IBM App Connect Enterprise \u003cLTS 12.0.14",
"product_id": "T045928"
}
},
{
"category": "product_version",
"name": "LTS 12.0.14",
"product": {
"name": "IBM App Connect Enterprise LTS 12.0.14",
"product_id": "T045928-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:app_connect_enterprise:lts_12.0.14"
}
}
}
],
"category": "product_name",
"name": "App Connect Enterprise"
},
{
"branches": [
{
"category": "product_version",
"name": "Operator",
"product": {
"name": "IBM MQ Operator",
"product_id": "T036688",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:operator"
}
}
},
{
"category": "product_version",
"name": "Container",
"product": {
"name": "IBM MQ Container",
"product_id": "T040640",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:mq:container"
}
}
}
],
"category": "product_name",
"name": "MQ"
},
{
"branches": [
{
"category": "product_version",
"name": "V10",
"product": {
"name": "IBM Power Hardware Management Console V10",
"product_id": "T023373",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v10"
}
}
},
{
"category": "product_version",
"name": "V11",
"product": {
"name": "IBM Power Hardware Management Console V11",
"product_id": "T046812",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:hardware_management_console:v11"
}
}
}
],
"category": "product_name",
"name": "Power Hardware Management Console"
},
{
"branches": [
{
"category": "product_version",
"name": "for Multiplatforms 11.1",
"product": {
"name": "IBM TXSeries for Multiplatforms 11.1",
"product_id": "T043237",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:txseries:for_multiplatforms_11.1"
}
}
}
],
"category": "product_name",
"name": "TXSeries"
},
{
"branches": [
{
"category": "product_version",
"name": "3.1",
"product": {
"name": "IBM VIOS 3.1",
"product_id": "1039165",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:3.1"
}
}
},
{
"category": "product_version",
"name": "4.1",
"product": {
"name": "IBM VIOS 4.1",
"product_id": "1522854",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:vios:4.1"
}
}
}
],
"category": "product_name",
"name": "VIOS"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "9",
"product": {
"name": "NetApp Data ONTAP 9",
"product_id": "T039981",
"product_identification_helper": {
"cpe": "cpe:/a:netapp:data_ontap:9"
}
}
}
],
"category": "product_name",
"name": "Data ONTAP"
}
],
"category": "vendor",
"name": "NetApp"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source Arch Linux",
"product": {
"name": "Open Source Arch Linux",
"product_id": "T013312",
"product_identification_helper": {
"cpe": "cpe:/o:archlinux:archlinux:-"
}
}
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c5.0.8",
"product": {
"name": "Open Source Fluentd \u003c5.0.8",
"product_id": "T047479"
}
},
{
"category": "product_version",
"name": "5.0.8",
"product": {
"name": "Open Source Fluentd 5.0.8",
"product_id": "T047479-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:fluentd:fluentd:5.0.8"
}
}
}
],
"category": "product_name",
"name": "Fluentd"
},
{
"category": "product_name",
"name": "Open Source libxml2",
"product": {
"name": "Open Source libxml2",
"product_id": "T044565",
"product_identification_helper": {
"cpe": "cpe:/a:xmlsoft:libxml2:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c12.3",
"product": {
"name": "RealObjects PDFreactor \u003c12.3",
"product_id": "T046765"
}
},
{
"category": "product_version",
"name": "12.3",
"product": {
"name": "RealObjects PDFreactor 12.3",
"product_id": "T046765-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:realobjects:pdfreactor:12.3"
}
}
}
],
"category": "product_name",
"name": "PDFreactor"
}
],
"category": "vendor",
"name": "RealObjects"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"branches": [
{
"category": "product_version",
"name": "Container Platform 4.10",
"product": {
"name": "Red Hat OpenShift Container Platform 4.10",
"product_id": "T025742",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.10"
}
}
},
{
"category": "product_version",
"name": "Container Platform 4.11",
"product": {
"name": "Red Hat OpenShift Container Platform 4.11",
"product_id": "T025990",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.11"
}
}
},
{
"category": "product_version",
"name": "Container Platform 4.12",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12",
"product_id": "T026435",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform_4.12"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.16.46",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.16.46",
"product_id": "T046064"
}
},
{
"category": "product_version",
"name": "Container Platform 4.16.46",
"product": {
"name": "Red Hat OpenShift Container Platform 4.16.46",
"product_id": "T046064-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.16.46"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.18.22",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.18.22",
"product_id": "T046065"
}
},
{
"category": "product_version",
"name": "Container Platform 4.18.22",
"product": {
"name": "Red Hat OpenShift Container Platform 4.18.22",
"product_id": "T046065-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.18.22"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.55",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.55",
"product_id": "T046202"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.55",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.55",
"product_id": "T046202-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.55"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.57",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.57",
"product_id": "T046523"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.57",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.57",
"product_id": "T046523-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.57"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.17.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.17.38",
"product_id": "T046524"
}
},
{
"category": "product_version",
"name": "Container Platform 4.17.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.17.38",
"product_id": "T046524-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.17.38"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.12.80",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.12.80",
"product_id": "T046943"
}
},
{
"category": "product_version",
"name": "Container Platform 4.12.80",
"product": {
"name": "Red Hat OpenShift Container Platform 4.12.80",
"product_id": "T046943-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.12.80"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.18.27",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.18.27",
"product_id": "T048184"
}
},
{
"category": "product_version",
"name": "Container Platform 4.18.27",
"product": {
"name": "Red Hat OpenShift Container Platform 4.18.27",
"product_id": "T048184-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.18.27"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.8.5",
"product": {
"name": "Tenable Security Nessus \u003c10.8.5",
"product_id": "T044617"
}
},
{
"category": "product_version",
"name": "10.8.5",
"product": {
"name": "Tenable Security Nessus 10.8.5",
"product_id": "T044617-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus:agent__10.8.5"
}
}
},
{
"category": "product_version_range",
"name": "\u003c10.9.0",
"product": {
"name": "Tenable Security Nessus \u003c10.9.0",
"product_id": "T044956"
}
},
{
"category": "product_version",
"name": "10.9.0",
"product": {
"name": "Tenable Security Nessus 10.9.0",
"product_id": "T044956-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:tenable:nessus:10.9.0"
}
}
}
],
"category": "product_name",
"name": "Nessus"
}
],
"category": "vendor",
"name": "Tenable Security"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49794",
"product_status": {
"known_affected": [
"67646",
"T036688",
"T004914",
"1139691",
"T046812",
"T044956",
"398363",
"T025990",
"T023373",
"434967",
"T048184",
"T013312",
"1039165",
"1522854",
"T044617",
"T045928",
"T039981",
"T046943",
"T044565",
"T046523",
"T046765",
"T043237",
"T046524",
"T002207",
"T000126",
"T027843",
"T027844",
"T046064",
"T025742",
"T026435",
"T046065",
"T046202",
"T040640",
"T047479"
]
},
"release_date": "2025-06-11T22:00:00.000+00:00",
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49795",
"product_status": {
"known_affected": [
"67646",
"T036688",
"T004914",
"1139691",
"T046812",
"T044956",
"398363",
"T025990",
"T023373",
"434967",
"T048184",
"T013312",
"1039165",
"1522854",
"T044617",
"T045928",
"T039981",
"T046943",
"T044565",
"T046523",
"T046765",
"T043237",
"T046524",
"T002207",
"T000126",
"T027843",
"T027844",
"T046064",
"T025742",
"T026435",
"T046065",
"T046202",
"T040640",
"T047479"
]
},
"release_date": "2025-06-11T22:00:00.000+00:00",
"title": "CVE-2025-49795"
},
{
"cve": "CVE-2025-49796",
"product_status": {
"known_affected": [
"67646",
"T036688",
"T004914",
"1139691",
"T046812",
"T044956",
"398363",
"T025990",
"T023373",
"434967",
"T048184",
"T013312",
"1039165",
"1522854",
"T044617",
"T045928",
"T039981",
"T046943",
"T044565",
"T046523",
"T046765",
"T043237",
"T046524",
"T002207",
"T000126",
"T027843",
"T027844",
"T046064",
"T025742",
"T026435",
"T046065",
"T046202",
"T040640",
"T047479"
]
},
"release_date": "2025-06-11T22:00:00.000+00:00",
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-6021",
"product_status": {
"known_affected": [
"67646",
"T036688",
"T004914",
"1139691",
"T046812",
"T044956",
"398363",
"T025990",
"T023373",
"434967",
"T048184",
"T013312",
"1039165",
"1522854",
"T044617",
"T045928",
"T039981",
"T046943",
"T044565",
"T046523",
"T046765",
"T043237",
"T046524",
"T002207",
"T000126",
"T027843",
"T027844",
"T046064",
"T025742",
"T026435",
"T046065",
"T046202",
"T040640",
"T047479"
]
},
"release_date": "2025-06-11T22:00:00.000+00:00",
"title": "CVE-2025-6021"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0907
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.4.0 à 8.4.5 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 9.0.0 à 9.3.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.4.0 à 8.4.3 | ||
| Oracle | MySQL | MySQL Enterprise Backup version 8.0.0 à 8.0.42 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 9.0.0 à 9.1.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 8.4.0 à 8.4.6 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.40 | ||
| Oracle | MySQL | MySQL Cluster version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: Components Services) version 8.0.0 à 8.0.43 | ||
| Oracle | MySQL | MySQL Server (Server: DML) version 9.0.0 à 9.4.0 | ||
| Oracle | MySQL | MySQL Workbench version 8.0.0 à 8.0.43 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server (Server: Optimizer) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.4.0 \u00e0 8.4.5",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 9.0.0 \u00e0 9.3.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.4.0 \u00e0 8.4.3",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup version 8.0.0 \u00e0 8.0.42",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 9.0.0 \u00e0 9.1.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 8.4.0 \u00e0 8.4.6",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.0 \u00e0 8.0.40",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Components Services) version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DML) version 9.0.0 \u00e0 9.4.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench version 8.0.0 \u00e0 8.0.43",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2025-5449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5449"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-53067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53067"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-5399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5399"
}
],
"initial_release_date": "2025-10-22T00:00:00",
"last_revision_date": "2025-10-22T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0907",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-22T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2025-10-21",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpuoct2025",
"url": "https://www.oracle.com/security-alerts/cpuoct2025.html"
}
]
}
CERTFR-2025-AVI-0746
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Dashboards | Cognos Command Center versions 10.2.4.1 et 10.2.5 antérieures à 10.2.5 FP1 IF1 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.0.x antérieures à 6.1.0.2 GA | ||
| IBM | QRadar | QRadar SIEM versions 7.5.0 antérieures à QRadar 7.5.0 UP13 IF01 | ||
| IBM | Sterling | Sterling Connect:Direct pour Microsoft Windows versions 6.4.x antérieures à 6.4.0.3 | ||
| IBM | WebSphere | WebSphere Remote Server versions 9.1, 8.0 et 8.5 sans le dernier correctif de sécurité | ||
| IBM | Cognos Dashboards | Cognos Dashboards on Cloud Pak for Data versions 5.x antérieures à 5.2.1 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.0.x antérieures à 6.2.0.2 GA | ||
| IBM | QRadar | QRadar Incident Forensics versions 7.5.0 antérieures à QIF 7.5.0 UP13 IF01 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.3 GA | ||
| IBM | Sterling | Sterling Connect:Direct pour Microsoft Windows versions 6.3.x antérieures à 6.3.0.6 | ||
| IBM | Db2 | Db2 Bridge versions antérieures à 1.1.1 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Command Center versions 10.2.4.1 et 10.2.5 ant\u00e9rieures \u00e0 10.2.5 FP1 IF1",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 QRadar 7.5.0 UP13 IF01",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct pour Microsoft Windows versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Remote Server versions 9.1, 8.0 et 8.5 sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Dashboards on Cloud Pak for Data versions 5.x ant\u00e9rieures \u00e0 5.2.1",
"product": {
"name": "Cognos Dashboards",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.0.x ant\u00e9rieures \u00e0 6.2.0.2 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.0 ant\u00e9rieures \u00e0 QIF 7.5.0 UP13 IF01",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.3 GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct pour Microsoft Windows versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.6",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Bridge versions ant\u00e9rieures \u00e0 1.1.1",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-6531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6531"
},
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2025-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24789"
},
{
"name": "CVE-2022-50020",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50020"
},
{
"name": "CVE-2025-47944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47944"
},
{
"name": "CVE-2024-50349",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50349"
},
{
"name": "CVE-2025-46835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46835"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2024-43420",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43420"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-27614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27614"
},
{
"name": "CVE-2022-49111",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49111"
},
{
"name": "CVE-2025-1470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1470"
},
{
"name": "CVE-2022-49058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49058"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2024-52006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52006"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48385"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2024-50154",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50154"
},
{
"name": "CVE-2025-27613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27613"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-10917",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10917"
},
{
"name": "CVE-2022-49136",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49136"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2022-49846",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49846"
},
{
"name": "CVE-2019-17543",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17543"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-48384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48384"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-27152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27152"
},
{
"name": "CVE-2025-1471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1471"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20012"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2024-28956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28956"
},
{
"name": "CVE-2025-2697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2697"
},
{
"name": "CVE-2025-47935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47935"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1494"
},
{
"name": "CVE-2025-1994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1994"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-24495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24495"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2022-49977",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49977"
},
{
"name": "CVE-2024-54661",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54661"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27533"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2019-5427",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5427"
},
{
"name": "CVE-2022-49788",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49788"
},
{
"name": "CVE-2025-20623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-20623"
},
{
"name": "CVE-2025-48997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48997"
},
{
"name": "CVE-2020-5260",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5260"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-7338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7338"
},
{
"name": "CVE-2025-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24790"
},
{
"name": "CVE-2024-45332",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45332"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
}
],
"initial_release_date": "2025-08-29T00:00:00",
"last_revision_date": "2025-08-29T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0746",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-08-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243411",
"url": "https://www.ibm.com/support/pages/node/7243411"
},
{
"published_at": "2025-08-22",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242915",
"url": "https://www.ibm.com/support/pages/node/7242915"
},
{
"published_at": "2025-08-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243372",
"url": "https://www.ibm.com/support/pages/node/7243372"
},
{
"published_at": "2025-08-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242159",
"url": "https://www.ibm.com/support/pages/node/7242159"
},
{
"published_at": "2025-08-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243146",
"url": "https://www.ibm.com/support/pages/node/7243146"
},
{
"published_at": "2025-08-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7242161",
"url": "https://www.ibm.com/support/pages/node/7242161"
},
{
"published_at": "2025-08-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243144",
"url": "https://www.ibm.com/support/pages/node/7243144"
},
{
"published_at": "2025-08-25",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243011",
"url": "https://www.ibm.com/support/pages/node/7243011"
},
{
"published_at": "2025-08-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7243373",
"url": "https://www.ibm.com/support/pages/node/7243373"
}
]
}
CERTFR-2025-AVI-0938
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu | Tanzu pour Postgres versions antérieures à 4.3.1 sur Kubernetes | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 6.31.0 | ||
| VMware | Tanzu | Tanzu pour Postgres versions antérieures à 13.22.0, 14.19.0, 15.14.0, 16.10.0 et 17.6.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.6.0 |
| Title | Publication Time | Tags | |||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.1 sur Kubernetes",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.31.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 13.22.0, 14.19.0, 15.14.0, 16.10.0 et 17.6.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.6.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2022-39176",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39176"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2021-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38593"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2020-26557",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26557"
},
{
"name": "CVE-2019-25059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25059"
},
{
"name": "CVE-2024-46951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46951"
},
{
"name": "CVE-2025-31273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31273"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-32913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32913"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2022-39177",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39177"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-2720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2720"
},
{
"name": "CVE-2024-46956",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46956"
},
{
"name": "CVE-2025-58060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58060"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-46953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46953"
},
{
"name": "CVE-2025-24216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24216"
},
{
"name": "CVE-2025-43212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43212"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-24150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24150"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2023-2222",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2222"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2784"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2024-44192",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44192"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-2723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2723"
},
{
"name": "CVE-2025-31278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31278"
},
{
"name": "CVE-2020-26559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26559"
},
{
"name": "CVE-2023-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46751"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-2724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2724"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2022-30294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30294"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-43368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43368"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2024-46954",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46954"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2020-26556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26556"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-32914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32914"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-43343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43343"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-43272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43272"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-32906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32906"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2020-26560",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26560"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-43216",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43216"
},
{
"name": "CVE-2023-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2004"
},
{
"name": "CVE-2025-52194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52194"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2023-24607",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24607"
},
{
"name": "CVE-2025-24209",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24209"
},
{
"name": "CVE-2024-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0444"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2017-17973",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17973"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-43342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43342"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-32049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32049"
},
{
"name": "CVE-2025-4948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4948"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2024-4453",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4453"
},
{
"name": "CVE-2025-31257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31257"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-11021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11021"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2024-46952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46952"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-7345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7345"
},
{
"name": "CVE-2025-30427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30427"
},
{
"name": "CVE-2025-32911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32911"
}
],
"initial_release_date": "2025-10-30T00:00:00",
"last_revision_date": "2025-10-30T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0938",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-10-30T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36277",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36277"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36284",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36284"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36281",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36281"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36282",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36282"
},
{
"published_at": "2025-10-29",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36283",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36283"
}
]
}
CERTFR-2025-AVI-0693
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions 8.1.x ant\u00e9rieures \u00e0 8.1.3",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 8.0.x ant\u00e9rieures \u00e0 8.0.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 3.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Valkey versions 7.2.x ant\u00e9rieures \u00e0 7.2.10",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2021-3572",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3572"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-3826",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3826"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2023-2222",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2222"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
}
],
"initial_release_date": "2025-08-14T00:00:00",
"last_revision_date": "2025-08-14T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0693",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36036",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36036"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36035",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36035"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36038",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36038"
},
{
"published_at": "2025-08-14",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36037",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36037"
}
]
}
opensuse-su-2025:15321-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libxml2-2-2.13.8-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libxml2-2-2.13.8-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15321",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15321-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49794 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49795 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49796 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6170 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6170/"
}
],
"title": "libxml2-2-2.13.8-2.1 on GA media",
"tracking": {
"current_release_date": "2025-07-08T00:00:00Z",
"generator": {
"date": "2025-07-08T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15321-1",
"initial_release_date": "2025-07-08T00:00:00Z",
"revision_history": [
{
"date": "2025-07-08T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.13.8-2.1.aarch64",
"product": {
"name": "libxml2-2-2.13.8-2.1.aarch64",
"product_id": "libxml2-2-2.13.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.13.8-2.1.aarch64",
"product": {
"name": "libxml2-2-32bit-2.13.8-2.1.aarch64",
"product_id": "libxml2-2-32bit-2.13.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.13.8-2.1.aarch64",
"product": {
"name": "libxml2-devel-2.13.8-2.1.aarch64",
"product_id": "libxml2-devel-2.13.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.13.8-2.1.aarch64",
"product": {
"name": "libxml2-devel-32bit-2.13.8-2.1.aarch64",
"product_id": "libxml2-devel-32bit-2.13.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-doc-2.13.8-2.1.aarch64",
"product": {
"name": "libxml2-doc-2.13.8-2.1.aarch64",
"product_id": "libxml2-doc-2.13.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.13.8-2.1.aarch64",
"product": {
"name": "libxml2-tools-2.13.8-2.1.aarch64",
"product_id": "libxml2-tools-2.13.8-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.13.8-2.1.ppc64le",
"product": {
"name": "libxml2-2-2.13.8-2.1.ppc64le",
"product_id": "libxml2-2-2.13.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.13.8-2.1.ppc64le",
"product": {
"name": "libxml2-2-32bit-2.13.8-2.1.ppc64le",
"product_id": "libxml2-2-32bit-2.13.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.13.8-2.1.ppc64le",
"product": {
"name": "libxml2-devel-2.13.8-2.1.ppc64le",
"product_id": "libxml2-devel-2.13.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"product": {
"name": "libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"product_id": "libxml2-devel-32bit-2.13.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-doc-2.13.8-2.1.ppc64le",
"product": {
"name": "libxml2-doc-2.13.8-2.1.ppc64le",
"product_id": "libxml2-doc-2.13.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.13.8-2.1.ppc64le",
"product": {
"name": "libxml2-tools-2.13.8-2.1.ppc64le",
"product_id": "libxml2-tools-2.13.8-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.13.8-2.1.s390x",
"product": {
"name": "libxml2-2-2.13.8-2.1.s390x",
"product_id": "libxml2-2-2.13.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.13.8-2.1.s390x",
"product": {
"name": "libxml2-2-32bit-2.13.8-2.1.s390x",
"product_id": "libxml2-2-32bit-2.13.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.13.8-2.1.s390x",
"product": {
"name": "libxml2-devel-2.13.8-2.1.s390x",
"product_id": "libxml2-devel-2.13.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.13.8-2.1.s390x",
"product": {
"name": "libxml2-devel-32bit-2.13.8-2.1.s390x",
"product_id": "libxml2-devel-32bit-2.13.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-doc-2.13.8-2.1.s390x",
"product": {
"name": "libxml2-doc-2.13.8-2.1.s390x",
"product_id": "libxml2-doc-2.13.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.13.8-2.1.s390x",
"product": {
"name": "libxml2-tools-2.13.8-2.1.s390x",
"product_id": "libxml2-tools-2.13.8-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.13.8-2.1.x86_64",
"product": {
"name": "libxml2-2-2.13.8-2.1.x86_64",
"product_id": "libxml2-2-2.13.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.13.8-2.1.x86_64",
"product": {
"name": "libxml2-2-32bit-2.13.8-2.1.x86_64",
"product_id": "libxml2-2-32bit-2.13.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.13.8-2.1.x86_64",
"product": {
"name": "libxml2-devel-2.13.8-2.1.x86_64",
"product_id": "libxml2-devel-2.13.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.13.8-2.1.x86_64",
"product": {
"name": "libxml2-devel-32bit-2.13.8-2.1.x86_64",
"product_id": "libxml2-devel-32bit-2.13.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-doc-2.13.8-2.1.x86_64",
"product": {
"name": "libxml2-doc-2.13.8-2.1.x86_64",
"product_id": "libxml2-doc-2.13.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.13.8-2.1.x86_64",
"product": {
"name": "libxml2-tools-2.13.8-2.1.x86_64",
"product_id": "libxml2-tools-2.13.8-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64"
},
"product_reference": "libxml2-2-2.13.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le"
},
"product_reference": "libxml2-2-2.13.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x"
},
"product_reference": "libxml2-2-2.13.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64"
},
"product_reference": "libxml2-2-2.13.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64"
},
"product_reference": "libxml2-2-32bit-2.13.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le"
},
"product_reference": "libxml2-2-32bit-2.13.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x"
},
"product_reference": "libxml2-2-32bit-2.13.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.13.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64"
},
"product_reference": "libxml2-devel-2.13.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le"
},
"product_reference": "libxml2-devel-2.13.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x"
},
"product_reference": "libxml2-devel-2.13.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64"
},
"product_reference": "libxml2-devel-2.13.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-32bit-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64"
},
"product_reference": "libxml2-devel-32bit-2.13.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-32bit-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le"
},
"product_reference": "libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-32bit-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x"
},
"product_reference": "libxml2-devel-32bit-2.13.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-32bit-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64"
},
"product_reference": "libxml2-devel-32bit-2.13.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-doc-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64"
},
"product_reference": "libxml2-doc-2.13.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-doc-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le"
},
"product_reference": "libxml2-doc-2.13.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-doc-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x"
},
"product_reference": "libxml2-doc-2.13.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-doc-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64"
},
"product_reference": "libxml2-doc-2.13.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.13.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64"
},
"product_reference": "libxml2-tools-2.13.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.13.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le"
},
"product_reference": "libxml2-tools-2.13.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.13.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x"
},
"product_reference": "libxml2-tools-2.13.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.13.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
},
"product_reference": "libxml2-tools-2.13.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49794"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49794",
"url": "https://www.suse.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "SUSE Bug 1244554 for CVE-2025-49794",
"url": "https://bugzilla.suse.com/1244554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49795"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49795",
"url": "https://www.suse.com/security/cve/CVE-2025-49795"
},
{
"category": "external",
"summary": "SUSE Bug 1244555 for CVE-2025-49795",
"url": "https://bugzilla.suse.com/1244555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-49795"
},
{
"cve": "CVE-2025-49796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49796"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49796",
"url": "https://www.suse.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "SUSE Bug 1244557 for CVE-2025-49796",
"url": "https://bugzilla.suse.com/1244557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-6021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6021"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6021",
"url": "https://www.suse.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "SUSE Bug 1244580 for CVE-2025-6021",
"url": "https://bugzilla.suse.com/1244580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-08T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6170"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6170",
"url": "https://www.suse.com/security/cve/CVE-2025-6170"
},
{
"category": "external",
"summary": "SUSE Bug 1244700 for CVE-2025-6170",
"url": "https://bugzilla.suse.com/1244700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-2-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-devel-32bit-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-doc-2.13.8-2.1.x86_64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.aarch64",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.ppc64le",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.s390x",
"openSUSE Tumbleweed:libxml2-tools-2.13.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-08T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-6170"
}
]
}
fkie_cve-2025-49794
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:10630 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:10698 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:10699 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:11580 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12098 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12099 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12199 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12237 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12239 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12240 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:12241 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:13335 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:15397 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:15827 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:15828 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:18217 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:18218 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:18219 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:18240 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19020 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19041 | ||
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2025:19046 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2025-49794 | ||
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2372373 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors."
},
{
"lang": "es",
"value": "Se detect\u00f3 una vulnerabilidad de use-after-free en libxml2. Este problema se produce al analizar elementos XPath en ciertas circunstancias cuando el esquema XML contiene los elementos de esquema . Esta falla permite a un actor malicioso manipular un documento XML malicioso que se utiliza como entrada para libxml, lo que provoca el bloqueo del programa al usar libxml u otros posibles comportamientos indefinidos."
}
],
"id": "CVE-2025-49794",
"lastModified": "2025-10-30T06:15:44.000",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.2,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-06-16T16:15:18.997",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-825"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
msrc_cve-2025-49794
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49794 Libxml: heap use after free (uaf) leads to denial of service (dos) - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-49794.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Libxml: heap use after free (uaf) leads to denial of service (dos)",
"tracking": {
"current_release_date": "2025-07-29T00:00:00.000Z",
"generator": {
"date": "2025-10-20T03:23:37.627Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-49794",
"initial_release_date": "2025-06-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-07-29T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccm2 libxml2 2.10.4-8",
"product": {
"name": "\u003ccm2 libxml2 2.10.4-8",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cm2 libxml2 2.10.4-8",
"product": {
"name": "cm2 libxml2 2.10.4-8",
"product_id": "19569"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 libxml2 2.11.5-6",
"product": {
"name": "\u003cazl3 libxml2 2.11.5-6",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "azl3 libxml2 2.11.5-6",
"product": {
"name": "azl3 libxml2 2.11.5-6",
"product_id": "19618"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 libxml2 2.10.4-8",
"product": {
"name": "\u003ccbl2 libxml2 2.10.4-8",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "cbl2 libxml2 2.10.4-8",
"product": {
"name": "cbl2 libxml2 2.10.4-8",
"product_id": "20212"
}
}
],
"category": "product_name",
"name": "libxml2"
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccm2 libxml2 2.10.4-8 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cm2 libxml2 2.10.4-8 as a component of CBL Mariner 2.0",
"product_id": "19569-17086"
},
"product_reference": "19569",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libxml2 2.11.5-6 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libxml2 2.11.5-6 as a component of Azure Linux 3.0",
"product_id": "19618-17084"
},
"product_reference": "19618",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libxml2 2.10.4-8 as a component of CBL Mariner 2.0",
"product_id": "17086-1"
},
"product_reference": "1",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libxml2 2.10.4-8 as a component of CBL Mariner 2.0",
"product_id": "20212-17086"
},
"product_reference": "20212",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49794",
"cwe": {
"id": "CWE-825",
"name": "Expired Pointer Dereference"
},
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"19569-17086",
"19618-17084",
"20212-17086"
],
"known_affected": [
"17086-3",
"17084-2",
"17086-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-49794 Libxml: heap use after free (uaf) leads to denial of service (dos) - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-49794.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-07-29T00:00:00.000Z",
"details": "2.10.4-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3",
"17086-1"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-07-29T00:00:00.000Z",
"details": "2.11.5-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "NONE",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.1,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"17086-3",
"17084-2",
"17086-1"
]
}
],
"title": "Libxml: heap use after free (uaf) leads to denial of service (dos)"
}
]
}
suse-su-2025:02355-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libxml2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libxml2 fixes the following issues:\n\n- CVE-2025-49794: Fixed a heap use after free which could lead to denial of service. (bsc#1244554)\n- CVE-2025-49796: Fixed type confusion which could lead to denial of service. (bsc#1244557)\n- CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash. (bsc#1244700)\n- CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead to stack buffer overflow. (bsc#1244590)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2355,SUSE-SLE-Micro-5.3-2025-2355,SUSE-SLE-Micro-5.4-2025-2355,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2355,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2355,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2355,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2355,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2025-2355,SUSE-SLE-Product-SUSE-Manager-Server-4.3-2025-2355",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02355-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02355-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502355-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02355-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244554",
"url": "https://bugzilla.suse.com/1244554"
},
{
"category": "self",
"summary": "SUSE Bug 1244557",
"url": "https://bugzilla.suse.com/1244557"
},
{
"category": "self",
"summary": "SUSE Bug 1244590",
"url": "https://bugzilla.suse.com/1244590"
},
{
"category": "self",
"summary": "SUSE Bug 1244700",
"url": "https://bugzilla.suse.com/1244700"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49794 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49796 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6170 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6170/"
}
],
"title": "Security update for libxml2",
"tracking": {
"current_release_date": "2025-07-17T13:02:49Z",
"generator": {
"date": "2025-07-17T13:02:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02355-1",
"initial_release_date": "2025-07-17T13:02:49Z",
"revision_history": [
{
"date": "2025-07-17T13:02:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.14-150400.5.44.1.aarch64",
"product": {
"name": "libxml2-2-2.9.14-150400.5.44.1.aarch64",
"product_id": "libxml2-2-2.9.14-150400.5.44.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"product": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"product_id": "libxml2-devel-2.9.14-150400.5.44.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"product": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"product_id": "libxml2-tools-2.9.14-150400.5.44.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"product": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"product_id": "python3-libxml2-2.9.14-150400.5.44.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"product": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"product_id": "python311-libxml2-2.9.14-150400.5.44.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-64bit-2.9.14-150400.5.44.1.aarch64_ilp32",
"product": {
"name": "libxml2-2-64bit-2.9.14-150400.5.44.1.aarch64_ilp32",
"product_id": "libxml2-2-64bit-2.9.14-150400.5.44.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libxml2-devel-64bit-2.9.14-150400.5.44.1.aarch64_ilp32",
"product": {
"name": "libxml2-devel-64bit-2.9.14-150400.5.44.1.aarch64_ilp32",
"product_id": "libxml2-devel-64bit-2.9.14-150400.5.44.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.14-150400.5.44.1.i586",
"product": {
"name": "libxml2-2-2.9.14-150400.5.44.1.i586",
"product_id": "libxml2-2-2.9.14-150400.5.44.1.i586"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.14-150400.5.44.1.i586",
"product": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.i586",
"product_id": "libxml2-devel-2.9.14-150400.5.44.1.i586"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.14-150400.5.44.1.i586",
"product": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.i586",
"product_id": "libxml2-tools-2.9.14-150400.5.44.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.9.14-150400.5.44.1.i586",
"product": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.i586",
"product_id": "python3-libxml2-2.9.14-150400.5.44.1.i586"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.9.14-150400.5.44.1.i586",
"product": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.i586",
"product_id": "python311-libxml2-2.9.14-150400.5.44.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-doc-2.9.14-150400.5.44.1.noarch",
"product": {
"name": "libxml2-doc-2.9.14-150400.5.44.1.noarch",
"product_id": "libxml2-doc-2.9.14-150400.5.44.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"product": {
"name": "libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"product_id": "libxml2-2-2.9.14-150400.5.44.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"product": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"product_id": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"product": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"product_id": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"product": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"product_id": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"product": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"product_id": "python311-libxml2-2.9.14-150400.5.44.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.14-150400.5.44.1.s390x",
"product": {
"name": "libxml2-2-2.9.14-150400.5.44.1.s390x",
"product_id": "libxml2-2-2.9.14-150400.5.44.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.14-150400.5.44.1.s390x",
"product": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.s390x",
"product_id": "libxml2-devel-2.9.14-150400.5.44.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.14-150400.5.44.1.s390x",
"product": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.s390x",
"product_id": "libxml2-tools-2.9.14-150400.5.44.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.9.14-150400.5.44.1.s390x",
"product": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.s390x",
"product_id": "python3-libxml2-2.9.14-150400.5.44.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.9.14-150400.5.44.1.s390x",
"product": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.s390x",
"product_id": "python311-libxml2-2.9.14-150400.5.44.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"product": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"product_id": "libxml2-2-2.9.14-150400.5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"product": {
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"product_id": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"product": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"product_id": "libxml2-devel-2.9.14-150400.5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.9.14-150400.5.44.1.x86_64",
"product": {
"name": "libxml2-devel-32bit-2.9.14-150400.5.44.1.x86_64",
"product_id": "libxml2-devel-32bit-2.9.14-150400.5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"product": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"product_id": "libxml2-tools-2.9.14-150400.5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"product": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"product_id": "python3-libxml2-2.9.14-150400.5.44.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"product": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"product_id": "python311-libxml2-2.9.14-150400.5.44.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server 4.3",
"product": {
"name": "SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server:4.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.s390x as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.s390x",
"relates_to_product_reference": "SUSE Manager Server 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.9.14-150400.5.44.1.x86_64 as component of SUSE Manager Server 4.3",
"product_id": "SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
},
"product_reference": "python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server 4.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49794"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49794",
"url": "https://www.suse.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "SUSE Bug 1244554 for CVE-2025-49794",
"url": "https://bugzilla.suse.com/1244554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-17T13:02:49Z",
"details": "important"
}
],
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49796"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49796",
"url": "https://www.suse.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "SUSE Bug 1244557 for CVE-2025-49796",
"url": "https://bugzilla.suse.com/1244557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-17T13:02:49Z",
"details": "important"
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-6021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6021"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6021",
"url": "https://www.suse.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "SUSE Bug 1244580 for CVE-2025-6021",
"url": "https://bugzilla.suse.com/1244580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-17T13:02:49Z",
"details": "important"
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6170"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6170",
"url": "https://www.suse.com/security/cve/CVE-2025-6170"
},
{
"category": "external",
"summary": "SUSE Bug 1244700 for CVE-2025-6170",
"url": "https://bugzilla.suse.com/1244700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:python311-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Proxy 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-2-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-2-32bit-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-devel-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:libxml2-tools-2.9.14-150400.5.44.1.x86_64",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.ppc64le",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.s390x",
"SUSE Manager Server 4.3:python3-libxml2-2.9.14-150400.5.44.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-17T13:02:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-6170"
}
]
}
suse-su-2025:02294-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libxml2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libxml2 fixes the following issues:\n\n- CVE-2025-49794: Fixed a heap use after free which could lead to denial of service. (bsc#1244554)\n- CVE-2025-49796: Fixed type confusion which could lead to denial of service. (bsc#1244557)\n- CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash. (bsc#1244700)\n- CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead to stack buffer overflow. (bsc#1244590)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2294,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2294,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-2294",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02294-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02294-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502294-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02294-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244554",
"url": "https://bugzilla.suse.com/1244554"
},
{
"category": "self",
"summary": "SUSE Bug 1244557",
"url": "https://bugzilla.suse.com/1244557"
},
{
"category": "self",
"summary": "SUSE Bug 1244590",
"url": "https://bugzilla.suse.com/1244590"
},
{
"category": "self",
"summary": "SUSE Bug 1244700",
"url": "https://bugzilla.suse.com/1244700"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49794 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49796 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6170 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6170/"
}
],
"title": "Security update for libxml2",
"tracking": {
"current_release_date": "2025-07-11T14:47:43Z",
"generator": {
"date": "2025-07-11T14:47:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02294-1",
"initial_release_date": "2025-07-11T14:47:43Z",
"revision_history": [
{
"date": "2025-07-11T14:47:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.4-46.87.1.aarch64",
"product": {
"name": "libxml2-2-2.9.4-46.87.1.aarch64",
"product_id": "libxml2-2-2.9.4-46.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.4-46.87.1.aarch64",
"product": {
"name": "libxml2-devel-2.9.4-46.87.1.aarch64",
"product_id": "libxml2-devel-2.9.4-46.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.4-46.87.1.aarch64",
"product": {
"name": "libxml2-tools-2.9.4-46.87.1.aarch64",
"product_id": "libxml2-tools-2.9.4-46.87.1.aarch64"
}
},
{
"category": "product_version",
"name": "python-libxml2-2.9.4-46.87.1.aarch64",
"product": {
"name": "python-libxml2-2.9.4-46.87.1.aarch64",
"product_id": "python-libxml2-2.9.4-46.87.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-64bit-2.9.4-46.87.1.aarch64_ilp32",
"product": {
"name": "libxml2-2-64bit-2.9.4-46.87.1.aarch64_ilp32",
"product_id": "libxml2-2-64bit-2.9.4-46.87.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libxml2-devel-64bit-2.9.4-46.87.1.aarch64_ilp32",
"product": {
"name": "libxml2-devel-64bit-2.9.4-46.87.1.aarch64_ilp32",
"product_id": "libxml2-devel-64bit-2.9.4-46.87.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.4-46.87.1.i586",
"product": {
"name": "libxml2-2-2.9.4-46.87.1.i586",
"product_id": "libxml2-2-2.9.4-46.87.1.i586"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.4-46.87.1.i586",
"product": {
"name": "libxml2-devel-2.9.4-46.87.1.i586",
"product_id": "libxml2-devel-2.9.4-46.87.1.i586"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.4-46.87.1.i586",
"product": {
"name": "libxml2-tools-2.9.4-46.87.1.i586",
"product_id": "libxml2-tools-2.9.4-46.87.1.i586"
}
},
{
"category": "product_version",
"name": "python-libxml2-2.9.4-46.87.1.i586",
"product": {
"name": "python-libxml2-2.9.4-46.87.1.i586",
"product_id": "python-libxml2-2.9.4-46.87.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-doc-2.9.4-46.87.1.noarch",
"product": {
"name": "libxml2-doc-2.9.4-46.87.1.noarch",
"product_id": "libxml2-doc-2.9.4-46.87.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.4-46.87.1.ppc64le",
"product": {
"name": "libxml2-2-2.9.4-46.87.1.ppc64le",
"product_id": "libxml2-2-2.9.4-46.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.4-46.87.1.ppc64le",
"product": {
"name": "libxml2-devel-2.9.4-46.87.1.ppc64le",
"product_id": "libxml2-devel-2.9.4-46.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.4-46.87.1.ppc64le",
"product": {
"name": "libxml2-tools-2.9.4-46.87.1.ppc64le",
"product_id": "libxml2-tools-2.9.4-46.87.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python-libxml2-2.9.4-46.87.1.ppc64le",
"product": {
"name": "python-libxml2-2.9.4-46.87.1.ppc64le",
"product_id": "python-libxml2-2.9.4-46.87.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.4-46.87.1.s390",
"product": {
"name": "libxml2-2-2.9.4-46.87.1.s390",
"product_id": "libxml2-2-2.9.4-46.87.1.s390"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.4-46.87.1.s390",
"product": {
"name": "libxml2-devel-2.9.4-46.87.1.s390",
"product_id": "libxml2-devel-2.9.4-46.87.1.s390"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.4-46.87.1.s390",
"product": {
"name": "libxml2-tools-2.9.4-46.87.1.s390",
"product_id": "libxml2-tools-2.9.4-46.87.1.s390"
}
},
{
"category": "product_version",
"name": "python-libxml2-2.9.4-46.87.1.s390",
"product": {
"name": "python-libxml2-2.9.4-46.87.1.s390",
"product_id": "python-libxml2-2.9.4-46.87.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.4-46.87.1.s390x",
"product": {
"name": "libxml2-2-2.9.4-46.87.1.s390x",
"product_id": "libxml2-2-2.9.4-46.87.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.9.4-46.87.1.s390x",
"product": {
"name": "libxml2-2-32bit-2.9.4-46.87.1.s390x",
"product_id": "libxml2-2-32bit-2.9.4-46.87.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.4-46.87.1.s390x",
"product": {
"name": "libxml2-devel-2.9.4-46.87.1.s390x",
"product_id": "libxml2-devel-2.9.4-46.87.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.9.4-46.87.1.s390x",
"product": {
"name": "libxml2-devel-32bit-2.9.4-46.87.1.s390x",
"product_id": "libxml2-devel-32bit-2.9.4-46.87.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.4-46.87.1.s390x",
"product": {
"name": "libxml2-tools-2.9.4-46.87.1.s390x",
"product_id": "libxml2-tools-2.9.4-46.87.1.s390x"
}
},
{
"category": "product_version",
"name": "python-libxml2-2.9.4-46.87.1.s390x",
"product": {
"name": "python-libxml2-2.9.4-46.87.1.s390x",
"product_id": "python-libxml2-2.9.4-46.87.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.9.4-46.87.1.x86_64",
"product": {
"name": "libxml2-2-2.9.4-46.87.1.x86_64",
"product_id": "libxml2-2-2.9.4-46.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"product": {
"name": "libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"product_id": "libxml2-2-32bit-2.9.4-46.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.9.4-46.87.1.x86_64",
"product": {
"name": "libxml2-devel-2.9.4-46.87.1.x86_64",
"product_id": "libxml2-devel-2.9.4-46.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.9.4-46.87.1.x86_64",
"product": {
"name": "libxml2-devel-32bit-2.9.4-46.87.1.x86_64",
"product_id": "libxml2-devel-32bit-2.9.4-46.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.9.4-46.87.1.x86_64",
"product": {
"name": "libxml2-tools-2.9.4-46.87.1.x86_64",
"product_id": "libxml2-tools-2.9.4-46.87.1.x86_64"
}
},
{
"category": "product_version",
"name": "python-libxml2-2.9.4-46.87.1.x86_64",
"product": {
"name": "python-libxml2-2.9.4-46.87.1.x86_64",
"product_id": "python-libxml2-2.9.4-46.87.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.4-46.87.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64"
},
"product_reference": "libxml2-2-2.9.4-46.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.4-46.87.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le"
},
"product_reference": "libxml2-2-2.9.4-46.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.4-46.87.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x"
},
"product_reference": "libxml2-2-2.9.4-46.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-2-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.4-46.87.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x"
},
"product_reference": "libxml2-2-32bit-2.9.4-46.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.4-46.87.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64"
},
"product_reference": "libxml2-devel-2.9.4-46.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.4-46.87.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le"
},
"product_reference": "libxml2-devel-2.9.4-46.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.4-46.87.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x"
},
"product_reference": "libxml2-devel-2.9.4-46.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-doc-2.9.4-46.87.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch"
},
"product_reference": "libxml2-doc-2.9.4-46.87.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.4-46.87.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64"
},
"product_reference": "libxml2-tools-2.9.4-46.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.4-46.87.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le"
},
"product_reference": "libxml2-tools-2.9.4-46.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.4-46.87.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x"
},
"product_reference": "libxml2-tools-2.9.4-46.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-libxml2-2.9.4-46.87.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64"
},
"product_reference": "python-libxml2-2.9.4-46.87.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-libxml2-2.9.4-46.87.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le"
},
"product_reference": "python-libxml2-2.9.4-46.87.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-libxml2-2.9.4-46.87.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x"
},
"product_reference": "python-libxml2-2.9.4-46.87.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-libxml2-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64"
},
"product_reference": "python-libxml2-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-2-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-devel-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-doc-2.9.4-46.87.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch"
},
"product_reference": "libxml2-doc-2.9.4-46.87.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64"
},
"product_reference": "libxml2-tools-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python-libxml2-2.9.4-46.87.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
},
"product_reference": "python-libxml2-2.9.4-46.87.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49794"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49794",
"url": "https://www.suse.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "SUSE Bug 1244554 for CVE-2025-49794",
"url": "https://bugzilla.suse.com/1244554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-11T14:47:43Z",
"details": "important"
}
],
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49796"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49796",
"url": "https://www.suse.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "SUSE Bug 1244557 for CVE-2025-49796",
"url": "https://bugzilla.suse.com/1244557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-11T14:47:43Z",
"details": "important"
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-6021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6021"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6021",
"url": "https://www.suse.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "SUSE Bug 1244580 for CVE-2025-6021",
"url": "https://bugzilla.suse.com/1244580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-11T14:47:43Z",
"details": "important"
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6170"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6170",
"url": "https://www.suse.com/security/cve/CVE-2025-6170"
},
{
"category": "external",
"summary": "SUSE Bug 1244700 for CVE-2025-6170",
"url": "https://bugzilla.suse.com/1244700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:python-libxml2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-2-32bit-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-devel-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-doc-2.9.4-46.87.1.noarch",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libxml2-tools-2.9.4-46.87.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:python-libxml2-2.9.4-46.87.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-11T14:47:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-6170"
}
]
}
suse-su-2025:02260-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libxml2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libxml2 fixes the following issues:\n\n- CVE-2025-49794: Fixed a heap use after free which could lead to denial of service. (bsc#1244554)\n- CVE-2025-49796: Fixed type confusion which could lead to denial of service. (bsc#1244557)\n- CVE-2025-49795: Fixed a null pointer dereference which could lead to denial of service. (bsc#1244555)\n- CVE-2025-6170: Fixed a stack buffer overflow which could lead to a crash. (bsc#1244700)\n- CVE-2025-6021: Fixed an integer overflow in xmlBuildQName() which could lead to stack buffer overflow. (bsc#1244590)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2260,SUSE-SLE-Module-Basesystem-15-SP7-2025-2260,SUSE-SLE-Module-Python3-15-SP7-2025-2260",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02260-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02260-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502260-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02260-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244554",
"url": "https://bugzilla.suse.com/1244554"
},
{
"category": "self",
"summary": "SUSE Bug 1244555",
"url": "https://bugzilla.suse.com/1244555"
},
{
"category": "self",
"summary": "SUSE Bug 1244557",
"url": "https://bugzilla.suse.com/1244557"
},
{
"category": "self",
"summary": "SUSE Bug 1244590",
"url": "https://bugzilla.suse.com/1244590"
},
{
"category": "self",
"summary": "SUSE Bug 1244700",
"url": "https://bugzilla.suse.com/1244700"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49794 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49794/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49795 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49795/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-49796 page",
"url": "https://www.suse.com/security/cve/CVE-2025-49796/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6021 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6021/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-6170 page",
"url": "https://www.suse.com/security/cve/CVE-2025-6170/"
}
],
"title": "Security update for libxml2",
"tracking": {
"current_release_date": "2025-07-09T17:04:33Z",
"generator": {
"date": "2025-07-09T17:04:33Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02260-1",
"initial_release_date": "2025-07-09T17:04:33Z",
"revision_history": [
{
"date": "2025-07-09T17:04:33Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.12.10-150700.4.3.1.aarch64",
"product": {
"name": "libxml2-2-2.12.10-150700.4.3.1.aarch64",
"product_id": "libxml2-2-2.12.10-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"product": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"product_id": "libxml2-devel-2.12.10-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"product": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"product_id": "libxml2-tools-2.12.10-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"product": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"product_id": "python3-libxml2-2.12.10-150700.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"product": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"product_id": "python311-libxml2-2.12.10-150700.4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libxml2-2-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
"product_id": "libxml2-2-64bit-2.12.10-150700.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libxml2-devel-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
"product": {
"name": "libxml2-devel-64bit-2.12.10-150700.4.3.1.aarch64_ilp32",
"product_id": "libxml2-devel-64bit-2.12.10-150700.4.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.12.10-150700.4.3.1.i586",
"product": {
"name": "libxml2-2-2.12.10-150700.4.3.1.i586",
"product_id": "libxml2-2-2.12.10-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.12.10-150700.4.3.1.i586",
"product": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.i586",
"product_id": "libxml2-devel-2.12.10-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.12.10-150700.4.3.1.i586",
"product": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.i586",
"product_id": "libxml2-tools-2.12.10-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.12.10-150700.4.3.1.i586",
"product": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.i586",
"product_id": "python3-libxml2-2.12.10-150700.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.12.10-150700.4.3.1.i586",
"product": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.i586",
"product_id": "python311-libxml2-2.12.10-150700.4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-doc-2.12.10-150700.4.3.1.noarch",
"product": {
"name": "libxml2-doc-2.12.10-150700.4.3.1.noarch",
"product_id": "libxml2-doc-2.12.10-150700.4.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"product": {
"name": "libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"product_id": "libxml2-2-2.12.10-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"product": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"product_id": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"product": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"product_id": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"product": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"product_id": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"product": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"product_id": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.12.10-150700.4.3.1.s390x",
"product": {
"name": "libxml2-2-2.12.10-150700.4.3.1.s390x",
"product_id": "libxml2-2-2.12.10-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.12.10-150700.4.3.1.s390x",
"product": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.s390x",
"product_id": "libxml2-devel-2.12.10-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.12.10-150700.4.3.1.s390x",
"product": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.s390x",
"product_id": "libxml2-tools-2.12.10-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.12.10-150700.4.3.1.s390x",
"product": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.s390x",
"product_id": "python3-libxml2-2.12.10-150700.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.12.10-150700.4.3.1.s390x",
"product": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.s390x",
"product_id": "python311-libxml2-2.12.10-150700.4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libxml2-2-2.12.10-150700.4.3.1.x86_64",
"product": {
"name": "libxml2-2-2.12.10-150700.4.3.1.x86_64",
"product_id": "libxml2-2-2.12.10-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"product": {
"name": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"product_id": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"product": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"product_id": "libxml2-devel-2.12.10-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-devel-32bit-2.12.10-150700.4.3.1.x86_64",
"product": {
"name": "libxml2-devel-32bit-2.12.10-150700.4.3.1.x86_64",
"product_id": "libxml2-devel-32bit-2.12.10-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"product": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"product_id": "libxml2-tools-2.12.10-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"product": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"product_id": "python3-libxml2-2.12.10-150700.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-libxml2-2.12.10-150700.4.3.1.x86_64",
"product": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.x86_64",
"product_id": "python311-libxml2-2.12.10-150700.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp7"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64"
},
"product_reference": "libxml2-2-2.12.10-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le"
},
"product_reference": "libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x"
},
"product_reference": "libxml2-2-2.12.10-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64"
},
"product_reference": "libxml2-2-2.12.10-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64"
},
"product_reference": "libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64"
},
"product_reference": "libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le"
},
"product_reference": "libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x"
},
"product_reference": "libxml2-devel-2.12.10-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-devel-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64"
},
"product_reference": "libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64"
},
"product_reference": "libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le"
},
"product_reference": "libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x"
},
"product_reference": "libxml2-tools-2.12.10-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libxml2-tools-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64"
},
"product_reference": "libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64"
},
"product_reference": "python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le"
},
"product_reference": "python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x"
},
"product_reference": "python3-libxml2-2.12.10-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-libxml2-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64"
},
"product_reference": "python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64"
},
"product_reference": "python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le"
},
"product_reference": "python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x"
},
"product_reference": "python311-libxml2-2.12.10-150700.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-libxml2-2.12.10-150700.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
},
"product_reference": "python311-libxml2-2.12.10-150700.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-49794",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49794"
}
],
"notes": [
{
"category": "general",
"text": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49794",
"url": "https://www.suse.com/security/cve/CVE-2025-49794"
},
{
"category": "external",
"summary": "SUSE Bug 1244554 for CVE-2025-49794",
"url": "https://bugzilla.suse.com/1244554"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-09T17:04:33Z",
"details": "important"
}
],
"title": "CVE-2025-49794"
},
{
"cve": "CVE-2025-49795",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49795"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49795",
"url": "https://www.suse.com/security/cve/CVE-2025-49795"
},
{
"category": "external",
"summary": "SUSE Bug 1244555 for CVE-2025-49795",
"url": "https://bugzilla.suse.com/1244555"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-09T17:04:33Z",
"details": "important"
}
],
"title": "CVE-2025-49795"
},
{
"cve": "CVE-2025-49796",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-49796"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-49796",
"url": "https://www.suse.com/security/cve/CVE-2025-49796"
},
{
"category": "external",
"summary": "SUSE Bug 1244557 for CVE-2025-49796",
"url": "https://bugzilla.suse.com/1244557"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-09T17:04:33Z",
"details": "important"
}
],
"title": "CVE-2025-49796"
},
{
"cve": "CVE-2025-6021",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6021"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libxml2\u0027s xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6021",
"url": "https://www.suse.com/security/cve/CVE-2025-6021"
},
{
"category": "external",
"summary": "SUSE Bug 1244580 for CVE-2025-6021",
"url": "https://bugzilla.suse.com/1244580"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-09T17:04:33Z",
"details": "important"
}
],
"title": "CVE-2025-6021"
},
{
"cve": "CVE-2025-6170",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-6170"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-6170",
"url": "https://www.suse.com/security/cve/CVE-2025-6170"
},
{
"category": "external",
"summary": "SUSE Bug 1244700 for CVE-2025-6170",
"url": "https://bugzilla.suse.com/1244700"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-2-32bit-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-devel-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libxml2-tools-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-libxml2-2.12.10-150700.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP7:python311-libxml2-2.12.10-150700.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-09T17:04:33Z",
"details": "moderate"
}
],
"title": "CVE-2025-6170"
}
]
}
ghsa-qg4c-8pj4-qgw2
Vulnerability from github
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
{
"affected": [],
"aliases": [
"CVE-2025-49794"
],
"database_specific": {
"cwe_ids": [
"CWE-825"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-06-16T16:15:18Z",
"severity": "CRITICAL"
},
"details": "A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the \u003csch:name path=\"...\"/\u003e schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program\u0027s crash using libxml or other possible undefined behaviors.",
"id": "GHSA-qg4c-8pj4-qgw2",
"modified": "2025-10-30T06:30:53Z",
"published": "2025-06-16T18:32:19Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-49794"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-49794"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19046"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19041"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:19020"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:18240"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:18219"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:18218"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:18217"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:15828"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:15827"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:15397"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:13335"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12241"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12240"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12239"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12237"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12199"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12099"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12098"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:11580"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10699"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10698"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:10630"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
"type": "CVSS_V3"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.