Libxml: type confusion leads to denial of service (dos)
Summary
| CVE | CVE-2025-49796 |
|---|---|
| State | PUBLISHED |
| Assigner | redhat |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2025-06-16 16:15:19 UTC |
| Updated | 2026-04-19 20:16:21 UTC |
| Description | A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory. |
Risk And Classification
Primary CVSS: v3.1 9.1 CRITICAL from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
EPSS: 0.017770000 probability, percentile 0.827210000 (date 2026-04-19)
Problem Types: CWE-125 | CWE-125 Out-of-bounds Read
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 9.1 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
| 3.1 | CNA | CVSS | 9.1 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Red Hat | Red Hat Enterprise Linux 10 | unaffected 0:2.12.5-7.el10_0 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 7 Extended Lifecycle Support | unaffected 0:2.9.1-6.el7_9.10 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | unaffected 0:2.9.7-21.el8_10.1 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8 | unaffected 0:2.9.7-21.el8_10.1 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.2 Advanced Update Support | unaffected 0:2.9.7-9.el8_2.3 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support | unaffected 0:2.9.7-9.el8_4.6 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On | unaffected 0:2.9.7-9.el8_4.6 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support | unaffected 0:2.9.7-13.el8_6.10 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.6 Telecommunications Update Service | unaffected 0:2.9.7-13.el8_6.10 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions | unaffected 0:2.9.7-13.el8_6.10 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.8 Telecommunications Update Service | unaffected 0:2.9.7-16.el8_8.9 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 8.8 Update Services For SAP Solutions | unaffected 0:2.9.7-16.el8_8.9 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9 | unaffected 0:2.9.13-10.el9_6 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9 | unaffected 0:2.9.13-10.el9_6 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions | unaffected 0:2.9.13-1.el9_0.5 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.2 Update Services For SAP Solutions | unaffected 0:2.9.13-3.el9_2.7 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 9.4 Extended Update Support | unaffected 0:2.9.13-10.el9_4 * rpm | Not specified |
| CNA | Red Hat | Red Hat JBoss Core Services 2.4.62.SP2 | Not specified | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4.12 | unaffected 412.86.202510291903-0 * rpm | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4.13 | unaffected 413.92.202510150118-0 * rpm | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4.14 | unaffected 414.92.202510211419-0 * rpm | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4.17 | unaffected 417.94.202510112152-0 * rpm | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4.18 | unaffected 418.94.202510230424-0 * rpm | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4.19 | unaffected 4.19.9.6.202510140714-0 * rpm | Not specified |
| CNA | Red Hat | Red Hat OpenShift Container Platform 4.20 | unaffected 4.20.9.6.202509251656-0 * rpm | Not specified |
| CNA | Red Hat | Red Hat Web Terminal 1.11 On RHEL 9 | unaffected 1.11-19 * rpm | Not specified |
| CNA | Red Hat | Red Hat Web Terminal 1.11 On RHEL 9 | unaffected 1.11-8 * rpm | Not specified |
| CNA | Red Hat | Red Hat Web Terminal 1.12 On RHEL 9 | unaffected 1.12-4 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-11 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-11 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-11 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-10 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-10 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-4 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-9 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-18 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-11 * rpm | Not specified |
| CNA | Red Hat | RHOSS-1.36-RHEL-8 | unaffected 1.36.0-7 * rpm | Not specified |
| CNA | Red Hat | Cert-manager Operator For Red Hat OpenShift 1.16 | unaffected sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b * rpm | Not specified |
| CNA | Red Hat | File Integrity Operator 1 | unaffected sha256:364d11af112a5b1d3f28c9ea8b7aac678e111b9c7fca0516d61036904f318605 * rpm | Not specified |
| CNA | Red Hat | Red Hat Discovery 2 | unaffected sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344 * rpm | Not specified |
| CNA | Red Hat | Red Hat Hardened Images | unaffected 2.15.2-0.3.hum1 * rpm | Not specified |
| CNA | Red Hat | Red Hat Insights Proxy 1.5 | unaffected sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7 * rpm | Not specified |
| CNA | Red Hat | Red Hat Enterprise Linux 6 | Not specified | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| access.redhat.com/errata/RHSA-2025:21913 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:18217 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:7519 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2026:0934 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:11580 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:10698 | [email protected] | access.redhat.com | |
| gitlab.gnome.org/GNOME/libxml2/-/issues/933 | [email protected] | gitlab.gnome.org | |
| access.redhat.com/errata/RHSA-2025:12241 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:10699 | [email protected] | access.redhat.com | |
| lists.debian.org/debian-lts-announce/2025/07/msg00014.html | af854a3a-2127-422b-91ae-364da2661108 | lists.debian.org | |
| access.redhat.com/errata/RHSA-2025:12240 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:12199 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:18219 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:10630 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:19041 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:18218 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:19894 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:13335 | [email protected] | access.redhat.com | |
| access.redhat.com/security/cve/CVE-2025-49796 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:12239 | [email protected] | access.redhat.com | |
| bugzilla.redhat.com/show_bug.cgi | [email protected] | bugzilla.redhat.com | |
| access.redhat.com/errata/RHSA-2025:19046 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:19020 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:18240 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:15828 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:15397 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:12098 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:12237 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:15827 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:13267 | [email protected] | access.redhat.com | |
| access.redhat.com/errata/RHSA-2025:12099 | [email protected] | access.redhat.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| CNA | 2025-06-12T00:35:26.470Z | Reported to Red Hat. |
| CNA | 2025-06-11T00:00:00.000Z | Made public. |
Workarounds
CNA: There's no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.
There are currently no legacy QID mappings associated with this CVE.