First published: Wed Feb 12 2025(Updated: )
Important: libxml2 security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Red Hat Enterprise Linux for Power, little endian | ||
Red Hat Enterprise Linux 8 | ||
Red Hat Enterprise Linux for IBM z Systems | ||
Red Hat Enterprise Linux 8 | ||
redhat/libxml2 | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2 | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-debuginfo | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-debuginfo | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-debugsource | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-debugsource | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-devel | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-devel | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/python3-libxml2 | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/python3-libxml2-debuginfo | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/python3-libxml2-debuginfo | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/python3-libxml2 | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2 | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-debuginfo | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-debugsource | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2-devel | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/python3-libxml2 | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/python3-libxml2-debuginfo | <2.9.13-6.el9_5.1 | 2.9.13-6.el9_5.1 |
redhat/libxml2 | <2.9.13-6.el9_5.1.aa | 2.9.13-6.el9_5.1.aa |
redhat/libxml2-debuginfo | <2.9.13-6.el9_5.1.aa | 2.9.13-6.el9_5.1.aa |
redhat/libxml2-debugsource | <2.9.13-6.el9_5.1.aa | 2.9.13-6.el9_5.1.aa |
redhat/libxml2-devel | <2.9.13-6.el9_5.1.aa | 2.9.13-6.el9_5.1.aa |
redhat/python3-libxml2 | <2.9.13-6.el9_5.1.aa | 2.9.13-6.el9_5.1.aa |
redhat/python3-libxml2-debuginfo | <2.9.13-6.el9_5.1.aa | 2.9.13-6.el9_5.1.aa |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:1350 is classified as Important.
RHSA-2025:1350 addresses a use-after-free vulnerability in xmlXIncludeAddNode, identified by CVE-2022-49043.
To fix RHSA-2025:1350, update the libxml2 package to version 2.9.13-6.el9_5.1 or later.
RHSA-2025:1350 affects multiple versions of Red Hat Enterprise Linux including x86_64, Power, ARM 64, and IBM z Systems.
Users of affected software should apply the security update as soon as possible to mitigate the vulnerabilities.