[CLSA-2025:1757015069] Fix CVE(s): CVE-2025-6021
Type:
security
Severity:
Important
Release date:
2025-09-04 19:44:33 UTC
Description:
* SECURITY UPDATE: stack-based buffer overflow via integer overflows in buffer size calculations in xmlBuildQName function - debian/patches/CVE-2025-6021.patch: Fix integer overflow in xmlBuildQName that affects memory safety - CVE-2025-6021
Updated packages:
  • libxml2_2.9.3+dfsg1-1ubuntu0.7+tuxcare.els11_amd64.deb
    sha:5b7bf7d766dcf546be7a0d4166e7a77389b34780
  • libxml2-dev_2.9.3+dfsg1-1ubuntu0.7+tuxcare.els11_amd64.deb
    sha:46abb93c8029222dbced493f651820c7536bb609
  • libxml2-doc_2.9.3+dfsg1-1ubuntu0.7+tuxcare.els11_all.deb
    sha:23f301390fa3446e83c5ca8069ec80ee130cf7f3
  • libxml2-utils_2.9.3+dfsg1-1ubuntu0.7+tuxcare.els11_amd64.deb
    sha:ae68818ebbfa6cfa1a45e1219b862e3f0ef67c56
  • python-libxml2_2.9.3+dfsg1-1ubuntu0.7+tuxcare.els11_amd64.deb
    sha:56abf4caf3adb283c0a8eea678a114fafeb1fbd0
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.