[CLSA-2025:1761261543] Fix CVE(s): CVE-2024-56171
Type:
security
Severity:
Critical
Release date:
2025-10-23 23:19:07 UTC
Description:
* SECURITY UPDATE: use-after-free vulnerability in XML schema processing - debian/patches/CVE-2024-56171.patch: Fix use-after-free after xmlSchemaItemListAdd in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables - CVE-2024-56171
Updated packages:
  • libxml2_2.9.4+dfsg1-7+deb10u6+tuxcare.els1_amd64.deb
    sha:d856ee784d0e5418691329eaca7a2e2b0a334d73
  • libxml2-dev_2.9.4+dfsg1-7+deb10u6+tuxcare.els1_amd64.deb
    sha:18d58e5e54bebd72c636fdaa056c2410ddcc5059
  • libxml2-doc_2.9.4+dfsg1-7+deb10u6+tuxcare.els1_all.deb
    sha:00f206446fc264b7db59d3b50242bce22cfb4caa
  • libxml2-utils_2.9.4+dfsg1-7+deb10u6+tuxcare.els1_amd64.deb
    sha:ffb0174c1f81bf11ff3e19f0402a7fbf7083e8fe
  • python-libxml2_2.9.4+dfsg1-7+deb10u6+tuxcare.els1_amd64.deb
    sha:217028bfa7b7991c2691ec349fe239bb80dfb7ef
  • python3-libxml2_2.9.4+dfsg1-7+deb10u6+tuxcare.els1_amd64.deb
    sha:8204e644d1863c3ed236b633278d43c2dc9e3d57
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.