CVE-2025-49794 PUBLISHED

Libxml: heap use after free (uaf) leads to denial of service (dos)

Assigner: redhat
Reserved: 10.06.2025 Published: 16.06.2025 Updated: 16.06.2025

A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CVSS Score: 9.1

Product Status

Vendor Red Hat
Product Red Hat Enterprise Linux 10
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 6
Versions Default: unknown
Vendor Red Hat
Product Red Hat Enterprise Linux 7
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 8
Versions Default: affected
Vendor Red Hat
Product Red Hat Enterprise Linux 9
Versions Default: affected
Vendor Red Hat
Product Red Hat JBoss Core Services
Versions Default: affected

Workarounds

There's no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.

References

Problem Types

  • Expired Pointer Dereference CWE