First published: Mon Mar 10 2025(Updated: )
Important: libxml2 security update
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux Server for IBM z Systems | ||
Red Hat Enterprise Linux for ARM 64 | ||
Red Hat Enterprise Linux for SAP Solutions | ||
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions | ||
redhat/libxml2 | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2 | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-debuginfo | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-debugsource | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-devel | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/python3-libxml2 | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/python3-libxml2-debuginfo | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2 | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-debuginfo | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-debuginfo | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-debugsource | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-debugsource | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-devel | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2-devel | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/python3-libxml2 | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/python3-libxml2-debuginfo | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/python3-libxml2-debuginfo | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
redhat/libxml2 | <2.9.13-1.el9_0.4.aa | 2.9.13-1.el9_0.4.aa |
redhat/libxml2-debuginfo | <2.9.13-1.el9_0.4.aa | 2.9.13-1.el9_0.4.aa |
redhat/libxml2-debugsource | <2.9.13-1.el9_0.4.aa | 2.9.13-1.el9_0.4.aa |
redhat/libxml2-devel | <2.9.13-1.el9_0.4.aa | 2.9.13-1.el9_0.4.aa |
redhat/python3-libxml2 | <2.9.13-1.el9_0.4.aa | 2.9.13-1.el9_0.4.aa |
redhat/python3-libxml2-debuginfo | <2.9.13-1.el9_0.4.aa | 2.9.13-1.el9_0.4.aa |
redhat/python3-libxml2 | <2.9.13-1.el9_0.4 | 2.9.13-1.el9_0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of RHSA-2025:2483 is classified as Important.
To fix RHSA-2025:2483, update the libxml2 package to version 2.9.13-1.el9_0.4.
RHSA-2025:2483 addresses a use-after-free vulnerability identified as CVE-2024-56171 and a stack-based buffer overflow in xmlSnprintfElement.
RHSA-2025:2483 affects Red Hat Enterprise Linux for IBM z Systems, ARM 64, and x86_64 with several specific packages being vulnerable.
A reboot is not typically required after applying the updates related to RHSA-2025:2483, but it is recommended to verify the specific package instructions.