[CLSA-2025:1757522880] Fix CVE(s): CVE-2025-6021
Type:
security
Severity:
Important
Release date:
2025-09-10 16:48:04 UTC
Description:
* SECURITY UPDATE: stack-based buffer overflow vulnerability in xmlBuildQName function - debian/patches/CVE-2025-6021.patch: fix integer overflow in xmlBuildQName causing memory safety issue - CVE-2025-6021
Updated packages:
  • libxml2_2.9.10+dfsg-5ubuntu0.20.04.10+tuxcare.els3_amd64.deb
    sha:1f21056a4d5478d26e63b7fce9c505d4e1513d19
  • libxml2-dev_2.9.10+dfsg-5ubuntu0.20.04.10+tuxcare.els3_amd64.deb
    sha:443dc95017be3748e670750eb65762d2deeff3fb
  • libxml2-doc_2.9.10+dfsg-5ubuntu0.20.04.10+tuxcare.els3_all.deb
    sha:6d48030e2c436423c2fd3d61a2745eb15dc712b6
  • libxml2-utils_2.9.10+dfsg-5ubuntu0.20.04.10+tuxcare.els3_amd64.deb
    sha:3108bda76b453221b6b3552a6ce680b85eb9cbcd
  • python-libxml2_2.9.10+dfsg-5ubuntu0.20.04.10+tuxcare.els3_amd64.deb
    sha:7fe2728cc6575c1443db48499790a7a69c91eff6
  • python3-libxml2_2.9.10+dfsg-5ubuntu0.20.04.10+tuxcare.els3_amd64.deb
    sha:7f6d8ec1e388bd53202a61e6e8d48e18e7960ef8
Notes:
This page is generated automatically and has not been checked for errors. For clarification or corrections please contact the CloudLinux Packaging Team.