vulnerability
Amazon Linux 2023: CVE-2025-8732: Low priority package update for libxml2
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 2 | (AV:L/AC:L/Au:S/C:N/I:N/A:P) | Aug 8, 2025 | Jan 26, 2026 | Jan 26, 2026 |
Severity
2
CVSS
(AV:L/AC:L/Au:S/C:N/I:N/A:P)
Published
Aug 8, 2025
Added
Jan 26, 2026
Modified
Jan 26, 2026
Description
A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."
A flaw was found in libxml2. The `xmlParseSGMLCatalog` function within the `xmlcatalog` component exhibits uncontrolled recursion when processing a specially crafted catalog file. A local attacker can trigger this recursive behavior, which can lead to an application level denial of service.
A flaw was found in libxml2. The `xmlParseSGMLCatalog` function within the `xmlcatalog` component exhibits uncontrolled recursion when processing a specially crafted catalog file. A local attacker can trigger this recursive behavior, which can lead to an application level denial of service.
Solutions
amazon-linux-2023-upgrade-libxml2amazon-linux-2023-upgrade-libxml2-debuginfoamazon-linux-2023-upgrade-libxml2-debugsourceamazon-linux-2023-upgrade-libxml2-develamazon-linux-2023-upgrade-libxml2-staticamazon-linux-2023-upgrade-python3-libxml2amazon-linux-2023-upgrade-python3-libxml2-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.