First published: Tue Jun 29 2021(Updated: )
The libxml2 library is a development toolbox providing the implementation of various XML standards.<br>Security Fix(es):<br><li> libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)</li> <li> libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)</li> <li> libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)</li> <li> libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)</li> <li> libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)</li> For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/libxml2 | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2 | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-debuginfo | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-debuginfo | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-debugsource | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-debugsource | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-devel | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-devel | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/python3-libxml2 | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/python3-libxml2-debuginfo | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/python3-libxml2-debuginfo | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/python3-libxml2 | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2 | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-debuginfo | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-debugsource | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2-devel | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/python3-libxml2 | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/python3-libxml2-debuginfo | <2.9.7-9.el8_4.2 | 2.9.7-9.el8_4.2 |
redhat/libxml2 | <2.9.7-9.el8_4.2.aa | 2.9.7-9.el8_4.2.aa |
redhat/libxml2-debuginfo | <2.9.7-9.el8_4.2.aa | 2.9.7-9.el8_4.2.aa |
redhat/libxml2-debugsource | <2.9.7-9.el8_4.2.aa | 2.9.7-9.el8_4.2.aa |
redhat/libxml2-devel | <2.9.7-9.el8_4.2.aa | 2.9.7-9.el8_4.2.aa |
redhat/python3-libxml2 | <2.9.7-9.el8_4.2.aa | 2.9.7-9.el8_4.2.aa |
redhat/python3-libxml2-debuginfo | <2.9.7-9.el8_4.2.aa | 2.9.7-9.el8_4.2.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2021:2569 is critical due to the potential exploitation of a use-after-free vulnerability in the libxml2 library.
To fix RHSA-2021:2569, update the libxml2 package to version 2.9.7-9.el8_4.2 or later.
RHSA-2021:2569 addresses a use-after-free vulnerability (CVE-2021-3516) and a heap-based buffer overflow in the libxml2 library.
Versions prior to 2.9.7-9.el8_4.2 of the libxml2 library are affected by RHSA-2021:2569.
Yes, the Python3-libxml2 package is also updated to version 2.9.7-9.el8_4.2 as part of the RHSA-2021:2569 advisory.