Updated: 2025-08-20 03:16:28.626583
Description:
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
| Links | NIST | CIRCL | RHEL | Ubuntu |
| Severity | Score | |
|---|---|---|
| CVSS Version 2.x | NONE | 0.0 |
| CVSS Version 3.x | HIGH | 9.1 |
| OS name | Project name | Version | Score | Severity | Status | Errata | Last updated | Statement |
|---|---|---|---|---|---|---|---|---|
| RHEL 7 ELS | libxml2 | 2.9.1 | 9.1 | HIGH | Released | CLSA-2025:1753298958 | 2025-07-24 01:54:16 | |
| Ubuntu 16.04 ELS | libxml2 | 2.9.3 | 9.1 | HIGH | Released | CLSA-2025:1753729667 | 2025-07-29 04:51:25 | |
| Ubuntu 18.04 ELS | libxml2 | 2.9.4 | 9.1 | HIGH | Released | CLSA-2025:1753374216 | 2025-07-25 02:06:03 | |
| Ubuntu 20.04 ELS | libxml2 | 2.9.10 | 9.1 | HIGH | Released | CLSA-2025:1753298604 | 2025-07-24 01:54:19 |