Amazon Linux 2 Security Advisory: ALAS-2025-2794
Advisory Release Date: 2025-03-13 01:30 Pacific
Advisory Updated Date: 2025-03-25 16:12 Pacific
FAQs regarding Amazon Linux ALAS/CVE Severity
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used. (CVE-2024-56171)
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047. (CVE-2025-24928)
libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c. (CVE-2025-27113)
Affected Packages:
libxml2
Note:
This advisory is applicable to Amazon Linux 2 (AL2) Core repository. Visit this FAQ section for the difference between AL2 Core and AL2 Extras advisories.
Issue Correction:
Run yum update libxml2 to update your system.
aarch64:
libxml2-2.9.1-6.amzn2.5.16.aarch64
libxml2-devel-2.9.1-6.amzn2.5.16.aarch64
libxml2-static-2.9.1-6.amzn2.5.16.aarch64
libxml2-python-2.9.1-6.amzn2.5.16.aarch64
libxml2-debuginfo-2.9.1-6.amzn2.5.16.aarch64
i686:
libxml2-2.9.1-6.amzn2.5.16.i686
libxml2-devel-2.9.1-6.amzn2.5.16.i686
libxml2-static-2.9.1-6.amzn2.5.16.i686
libxml2-python-2.9.1-6.amzn2.5.16.i686
libxml2-debuginfo-2.9.1-6.amzn2.5.16.i686
src:
libxml2-2.9.1-6.amzn2.5.16.src
x86_64:
libxml2-2.9.1-6.amzn2.5.16.x86_64
libxml2-devel-2.9.1-6.amzn2.5.16.x86_64
libxml2-static-2.9.1-6.amzn2.5.16.x86_64
libxml2-python-2.9.1-6.amzn2.5.16.x86_64
libxml2-debuginfo-2.9.1-6.amzn2.5.16.x86_64