Thanks. That helps.
Original Message:
Sent: Mon May 05, 2025 08:39 AM
From: Alexander Reichle-Schmehl
Subject: Quick security bulletin: AIX is vulnerable to a DoS due to libxml2 (CVE-2022-49043)
Hi!
According to the announcement, the attack vector is local, not network:
CVSS Vector: (CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
If something was listening, it would be AV:N for network.
Best regards,
Alexander
------------------------------
Alexander Reichle-Schmehl
Original Message:
Sent: Tue April 29, 2025 05:54 AM
From: José Pina Coelho
Subject: Quick security bulletin: AIX is vulnerable to a DoS due to libxml2 (CVE-2022-49043)
Is there any port listening that processes XML input, or is this just a local attack vector ?
------------------------------
José Pina Coelho
IT Specialist at Kyndryl
Original Message:
Sent: Mon April 28, 2025 03:13 AM
From: Carlo Castillo
Subject: Quick security bulletin: AIX is vulnerable to a DoS due to libxml2 (CVE-2022-49043)
AIX uses libxml2 as part of its XML parsing functions, hence, AIX is exposed to a possible denial of service attack due to a vulnerability in libxml2 described in the said CVE record. This may affect the following AIX and VIO Server versions:
- AIX 7.3
- AIX 7.2
- VIOS 4.1
- VIOS 3.1
The following filesets are affected:
Fileset Lower Level Upper Level
bos.rte.control 7.2.5.0 7.2.5.204
bos.rte.control 7.3.1.0 7.3.1.3
bos.rte.control 7.3.2.0 7.3.2.2
bos.rte.control 7.3.3.0 7.3.3.0
Run lslpp -L | grep -i bos.rte.control
to see whether you have these filesets on your system.
The CVE description is found here.
More info is found on IBM Support at this link.
------------------------------
Carlo Castillo
Client Services Manager
IBM Redbooks Gold Author
------------------------------