A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Jun 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors. |
Title | libxml: Heap use after free (UAF) leads to Denial of service (DoS) | Libxml: heap use after free (uaf) leads to denial of service (dos) |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat jboss Core Services |
|
CPEs | cpe:/a:redhat:jboss_core_services:1 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat jboss Core Services |
|
References |
|
Thu, 12 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | libxml: Heap use after free (UAF) leads to Denial of service (DoS) | |
Weaknesses | CWE-825 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-06-16T15:24:31.020Z
Updated: 2025-06-16T15:51:46.475Z
Reserved: 2025-06-10T22:17:05.286Z
Link: CVE-2025-49794

Updated: 2025-06-16T15:50:49.909Z

Status : Received
Published: 2025-06-16T16:15:18.997
Modified: 2025-06-16T16:15:18.997
Link: CVE-2025-49794
