{"api_version":"1","generated_at":"2026-04-20T01:11:26+00:00","cve":"CVE-2025-49794","urls":{"html":"https://cve.report/CVE-2025-49794","api":"https://cve.report/api/cve/CVE-2025-49794.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2025-49794","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2025-49794"},"summary":{"title":"Libxml: heap use after free (uaf) leads to denial of service (dos)","description":"A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path=\"...\"/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.","state":"PUBLISHED","assigner":"redhat","published_at":"2025-06-16 16:15:18","updated_at":"2026-04-19 20:16:20"},"problem_types":["CWE-825","CWE-825 Expired Pointer Dereference"],"metrics":[{"version":"3.1","source":"secalert@redhat.com","type":"Secondary","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"9.1","severity":"CRITICAL","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2025:21913","name":"https://access.redhat.com/errata/RHSA-2025:21913","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:18217","name":"https://access.redhat.com/errata/RHSA-2025:18217","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2026:7519","name":"https://access.redhat.com/errata/RHSA-2026:7519","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2026:0934","name":"https://access.redhat.com/errata/RHSA-2026:0934","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:11580","name":"https://access.redhat.com/errata/RHSA-2025:11580","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:10698","name":"https://access.redhat.com/errata/RHSA-2025:10698","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:12241","name":"https://access.redhat.com/errata/RHSA-2025:12241","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2372373","name":"https://bugzilla.redhat.com/show_bug.cgi?id=2372373","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:10699","name":"https://access.redhat.com/errata/RHSA-2025:10699","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html","name":"https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:12240","name":"https://access.redhat.com/errata/RHSA-2025:12240","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:12199","name":"https://access.redhat.com/errata/RHSA-2025:12199","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:18219","name":"https://access.redhat.com/errata/RHSA-2025:18219","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:10630","name":"https://access.redhat.com/errata/RHSA-2025:10630","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:19041","name":"https://access.redhat.com/errata/RHSA-2025:19041","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:18218","name":"https://access.redhat.com/errata/RHSA-2025:18218","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:19894","name":"https://access.redhat.com/errata/RHSA-2025:19894","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:13335","name":"https://access.redhat.com/errata/RHSA-2025:13335","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:12239","name":"https://access.redhat.com/errata/RHSA-2025:12239","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:19046","name":"https://access.redhat.com/errata/RHSA-2025:19046","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:19020","name":"https://access.redhat.com/errata/RHSA-2025:19020","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/security/cve/CVE-2025-49794","name":"https://access.redhat.com/security/cve/CVE-2025-49794","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:18240","name":"https://access.redhat.com/errata/RHSA-2025:18240","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:15828","name":"https://access.redhat.com/errata/RHSA-2025:15828","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:15397","name":"https://access.redhat.com/errata/RHSA-2025:15397","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:12098","name":"https://access.redhat.com/errata/RHSA-2025:12098","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/931","name":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/931","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:12237","name":"https://access.redhat.com/errata/RHSA-2025:12237","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:15827","name":"https://access.redhat.com/errata/RHSA-2025:15827","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://access.redhat.com/errata/RHSA-2025:12099","name":"https://access.redhat.com/errata/RHSA-2025:12099","refsource":"secalert@redhat.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-49794","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2025-49794","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 10","version":"unaffected 0:2.12.5-7.el10_0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 7 Extended Lifecycle Support","version":"unaffected 0:2.9.1-6.el7_9.10 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8","version":"unaffected 0:2.9.7-21.el8_10.1 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8","version":"unaffected 0:2.9.7-21.el8_10.1 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.2 Advanced Update Support","version":"unaffected 0:2.9.7-9.el8_2.3 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support","version":"unaffected 0:2.9.7-9.el8_4.6 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On","version":"unaffected 0:2.9.7-9.el8_4.6 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support","version":"unaffected 0:2.9.7-13.el8_6.10 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.6 Telecommunications Update Service","version":"unaffected 0:2.9.7-13.el8_6.10 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions","version":"unaffected 0:2.9.7-13.el8_6.10 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.8 Telecommunications Update Service","version":"unaffected 0:2.9.7-16.el8_8.9 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions","version":"unaffected 0:2.9.7-16.el8_8.9 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","version":"unaffected 0:2.9.13-10.el9_6 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 9","version":"unaffected 0:2.9.13-10.el9_6 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions","version":"unaffected 0:2.9.13-1.el9_0.5 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions","version":"unaffected 0:2.9.13-3.el9_2.7 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 9.4 Extended Update Support","version":"unaffected 0:2.9.13-10.el9_4 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat JBoss Core Services 2.4.62.SP2","version":"","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.12","version":"unaffected 412.86.202510291903-0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.13","version":"unaffected 413.92.202510150118-0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.14","version":"unaffected 414.92.202510211419-0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.17","version":"unaffected 417.94.202510112152-0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.18","version":"unaffected 418.94.202510230424-0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.19","version":"unaffected 4.19.9.6.202510140714-0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat OpenShift Container Platform 4.20","version":"unaffected 4.20.9.6.202509251656-0 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Web Terminal 1.11 on RHEL 9","version":"unaffected 1.11-19 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Web Terminal 1.11 on RHEL 9","version":"unaffected 1.11-8 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Web Terminal 1.12 on RHEL 9","version":"unaffected 1.12-4 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-11 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-11 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-11 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-10 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-10 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-4 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-9 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-18 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-11 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"RHOSS-1.36-RHEL-8","version":"unaffected 1.36.0-7 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"cert-manager operator for Red Hat OpenShift 1.16","version":"unaffected sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"File Integrity Operator 1","version":"unaffected sha256:364d11af112a5b1d3f28c9ea8b7aac678e111b9c7fca0516d61036904f318605 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Hardened Images","version":"unaffected 2.15.2-0.3.hum1 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Insights proxy 1.5","version":"unaffected sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7 * rpm","platforms":[]},{"source":"CNA","vendor":"Red Hat","product":"Red Hat Enterprise Linux 6","version":"","platforms":[]}],"timeline":[{"source":"CNA","time":"2025-06-11T21:33:43.044Z","lang":"en","value":"Reported to Red Hat."},{"source":"CNA","time":"2025-06-10T00:00:00.000Z","lang":"en","value":"Made public."}],"solutions":[],"workarounds":[{"source":"CNA","title":"","value":"There's no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.","time":"","lang":"en"}],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":{"cve_year":"2025","cve_id":"49794","cve":"CVE-2025-49794","epss":"0.004450000","percentile":"0.634670000","score_date":"2026-04-19","updated_at":"2026-04-20 00:11:18"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"metrics":[{"other":{"content":{"id":"CVE-2025-49794","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-06-16T15:50:46.041375Z","version":"2.0.3"},"type":"ssvc"}}],"providerMetadata":{"dateUpdated":"2025-06-16T15:51:46.475Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"title":"CISA ADP Vulnrichment"},{"providerMetadata":{"dateUpdated":"2025-11-03T20:05:25.109Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html"}],"title":"CVE Program Container"}],"cna":{"affected":[{"collectionURL":"https://gitlab.gnome.org/GNOME/libxml2/","defaultStatus":"unaffected","packageName":"libxml2","versions":[{"lessThan":"2.15.0","status":"affected","version":"0","versionType":"semver"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:10.0"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 10","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.12.5-7.el10_0","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_els:7"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 7 Extended Lifecycle Support","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.1-6.el7_9.10","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:8::baseos","cpe:/a:redhat:enterprise_linux:8::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-21.el8_10.1","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:8::baseos","cpe:/a:redhat:enterprise_linux:8::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-21.el8_10.1","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_aus:8.2::baseos","cpe:/a:redhat:rhel_aus:8.2::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.2 Advanced Update Support","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-9.el8_2.3","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_eus_long_life:8.4::baseos","cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","cpe:/o:redhat:rhel_aus:8.4::baseos","cpe:/a:redhat:rhel_aus:8.4::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-9.el8_4.6","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_eus_long_life:8.4::baseos","cpe:/a:redhat:rhel_eus_long_life:8.4::appstream","cpe:/o:redhat:rhel_aus:8.4::baseos","cpe:/a:redhat:rhel_aus:8.4::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-9.el8_4.6","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_tus:8.6::baseos","cpe:/a:redhat:rhel_tus:8.6::appstream","cpe:/a:redhat:rhel_aus:8.6::appstream","cpe:/o:redhat:rhel_aus:8.6::baseos","cpe:/o:redhat:rhel_e4s:8.6::baseos","cpe:/a:redhat:rhel_e4s:8.6::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-13.el8_6.10","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_tus:8.6::baseos","cpe:/a:redhat:rhel_tus:8.6::appstream","cpe:/a:redhat:rhel_aus:8.6::appstream","cpe:/o:redhat:rhel_aus:8.6::baseos","cpe:/o:redhat:rhel_e4s:8.6::baseos","cpe:/a:redhat:rhel_e4s:8.6::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.6 Telecommunications Update Service","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-13.el8_6.10","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_tus:8.6::baseos","cpe:/a:redhat:rhel_tus:8.6::appstream","cpe:/a:redhat:rhel_aus:8.6::appstream","cpe:/o:redhat:rhel_aus:8.6::baseos","cpe:/o:redhat:rhel_e4s:8.6::baseos","cpe:/a:redhat:rhel_e4s:8.6::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-13.el8_6.10","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:rhel_tus:8.8::appstream","cpe:/o:redhat:rhel_tus:8.8::baseos","cpe:/o:redhat:rhel_e4s:8.8::baseos","cpe:/a:redhat:rhel_e4s:8.8::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.8 Telecommunications Update Service","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-16.el8_8.9","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:rhel_tus:8.8::appstream","cpe:/o:redhat:rhel_tus:8.8::baseos","cpe:/o:redhat:rhel_e4s:8.8::baseos","cpe:/a:redhat:rhel_e4s:8.8::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.7-16.el8_8.9","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:enterprise_linux:9::appstream","cpe:/o:redhat:enterprise_linux:9::baseos"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 9","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.13-10.el9_6","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:enterprise_linux:9::appstream","cpe:/o:redhat:enterprise_linux:9::baseos"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 9","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.13-10.el9_6","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:rhel_e4s:9.0::appstream","cpe:/o:redhat:rhel_e4s:9.0::baseos"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.13-1.el9_0.5","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:rhel_e4s:9.2::baseos","cpe:/a:redhat:rhel_e4s:9.2::appstream"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.13-3.el9_2.7","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:rhel_eus:9.4::appstream","cpe:/o:redhat:rhel_eus:9.4::baseos"],"defaultStatus":"affected","packageName":"libxml2","product":"Red Hat Enterprise Linux 9.4 Extended Update Support","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"0:2.9.13-10.el9_4","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:jboss_core_services:1"],"defaultStatus":"unaffected","packageName":"libxml2","product":"Red Hat JBoss Core Services 2.4.62.SP2","vendor":"Red Hat"},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openshift:4.12::el8"],"defaultStatus":"affected","packageName":"rhcos","product":"Red Hat OpenShift Container Platform 4.12","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"412.86.202510291903-0","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openshift:4.13::el9"],"defaultStatus":"affected","packageName":"rhcos","product":"Red Hat OpenShift Container Platform 4.13","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"413.92.202510150118-0","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openshift:4.14::el9"],"defaultStatus":"affected","packageName":"rhcos","product":"Red Hat OpenShift Container Platform 4.14","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"414.92.202510211419-0","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openshift:4.17::el9"],"defaultStatus":"affected","packageName":"rhcos","product":"Red Hat OpenShift Container Platform 4.17","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"417.94.202510112152-0","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openshift:4.18::el9"],"defaultStatus":"affected","packageName":"rhcos","product":"Red Hat OpenShift Container Platform 4.18","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"418.94.202510230424-0","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openshift:4.19::el9"],"defaultStatus":"affected","packageName":"rhcos","product":"Red Hat OpenShift Container Platform 4.19","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"4.19.9.6.202510140714-0","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/a:redhat:openshift:4.20::el9"],"defaultStatus":"affected","packageName":"rhcos","product":"Red Hat OpenShift Container Platform 4.20","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"4.20.9.6.202509251656-0","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:webterminal:1.11::el9"],"defaultStatus":"affected","packageName":"web-terminal/web-terminal-rhel9-operator","product":"Red Hat Web Terminal 1.11 on RHEL 9","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.11-19","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:webterminal:1.11::el9"],"defaultStatus":"affected","packageName":"web-terminal/web-terminal-tooling-rhel9","product":"Red Hat Web Terminal 1.11 on RHEL 9","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.11-8","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:webterminal:1.12::el9"],"defaultStatus":"affected","packageName":"web-terminal/web-terminal-tooling-rhel9","product":"Red Hat Web Terminal 1.12 on RHEL 9","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.12-4","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-data-index-ephemeral-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-11","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-data-index-postgresql-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-11","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-db-migrator-tool-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-11","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-jobs-service-ephemeral-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-10","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-jobs-service-postgresql-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-10","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-kn-workflow-cli-artifacts-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-4","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-management-console-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-9","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-rhel8-operator","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-18","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-swf-builder-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-11","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_serverless:1.36::el8"],"defaultStatus":"affected","packageName":"openshift-serverless-1/logic-swf-devmode-rhel8","product":"RHOSS-1.36-RHEL-8","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"1.36.0-7","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:cert_manager:1.16::el9"],"defaultStatus":"affected","packageName":"cert-manager/jetstack-cert-manager-rhel9","product":"cert-manager operator for Red Hat OpenShift 1.16","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"sha256:1abdfac084e7c86e7a93a19e5cf6b54db79b903bfb7474a42200f753b29eda4b","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:openshift_file_integrity_operator:1::el9"],"defaultStatus":"affected","packageName":"compliance/openshift-file-integrity-rhel8-operator","product":"File Integrity Operator 1","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"sha256:364d11af112a5b1d3f28c9ea8b7aac678e111b9c7fca0516d61036904f318605","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:hummingbird:1"],"defaultStatus":"affected","packageName":"libxml2-main","product":"Red Hat Hardened Images","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"2.15.2-0.3.hum1","versionType":"rpm"}]},{"collectionURL":"https://catalog.redhat.com/software/containers/","cpes":["cpe:/a:redhat:insights_proxy:1.5::el9"],"defaultStatus":"affected","packageName":"insights-proxy/insights-proxy-container-rhel9","product":"Red Hat Insights proxy 1.5","vendor":"Red Hat","versions":[{"lessThan":"*","status":"unaffected","version":"sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7","versionType":"rpm"}]},{"collectionURL":"https://access.redhat.com/downloads/content/package-browser/","cpes":["cpe:/o:redhat:enterprise_linux:6"],"defaultStatus":"unknown","packageName":"libxml2","product":"Red Hat Enterprise Linux 6","vendor":"Red Hat"}],"datePublic":"2025-06-10T00:00:00.000Z","descriptions":[{"lang":"en","value":"A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path=\"...\"/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors."}],"metrics":[{"other":{"content":{"namespace":"https://access.redhat.com/security/updates/classification/","value":"Important"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.1,"baseSeverity":"CRITICAL","confidentialityImpact":"NONE","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","version":"3.1"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-825","description":"Expired Pointer Dereference","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-19T19:34:51.344Z","orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat"},"references":[{"name":"RHSA-2025:10630","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:10630"},{"name":"RHSA-2025:10698","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:10698"},{"name":"RHSA-2025:10699","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:10699"},{"name":"RHSA-2025:11580","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:11580"},{"name":"RHSA-2025:12098","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:12098"},{"name":"RHSA-2025:12099","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:12099"},{"name":"RHSA-2025:12199","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:12199"},{"name":"RHSA-2025:12237","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:12237"},{"name":"RHSA-2025:12239","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:12239"},{"name":"RHSA-2025:12240","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:12240"},{"name":"RHSA-2025:12241","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:12241"},{"name":"RHSA-2025:13335","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:13335"},{"name":"RHSA-2025:15397","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:15397"},{"name":"RHSA-2025:15827","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:15827"},{"name":"RHSA-2025:15828","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:15828"},{"name":"RHSA-2025:18217","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:18217"},{"name":"RHSA-2025:18218","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:18218"},{"name":"RHSA-2025:18219","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:18219"},{"name":"RHSA-2025:18240","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:18240"},{"name":"RHSA-2025:19020","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:19020"},{"name":"RHSA-2025:19041","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:19041"},{"name":"RHSA-2025:19046","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:19046"},{"name":"RHSA-2025:19894","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:19894"},{"name":"RHSA-2025:21913","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2025:21913"},{"name":"RHSA-2026:0934","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2026:0934"},{"name":"RHSA-2026:7519","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"https://access.redhat.com/errata/RHSA-2026:7519"},{"tags":["vdb-entry","x_refsource_REDHAT"],"url":"https://access.redhat.com/security/cve/CVE-2025-49794"},{"name":"RHBZ#2372373","tags":["issue-tracking","x_refsource_REDHAT"],"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2372373"},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/931"}],"timeline":[{"lang":"en","time":"2025-06-11T21:33:43.044Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-06-10T00:00:00.000Z","value":"Made public."}],"title":"Libxml: heap use after free (uaf) leads to denial of service (dos)","workarounds":[{"lang":"en","value":"There's no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix."}],"x_generator":{"engine":"cvelib 1.8.0"},"x_redhatCweChain":"CWE-825: Expired Pointer Dereference"}},"cveMetadata":{"assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","assignerShortName":"redhat","cveId":"CVE-2025-49794","datePublished":"2025-06-16T15:24:31.020Z","dateReserved":"2025-06-10T22:17:05.286Z","dateUpdated":"2026-04-19T19:34:51.344Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2025-06-16 16:15:18","lastModifiedDate":"2026-04-19 20:16:20","problem_types":["CWE-825","CWE-825 Expired Pointer Dereference"],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H","baseScore":9.1,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.2}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2025","CveId":"49794","Ordinal":"1","Title":"Libxml: heap use after free (uaf) leads to denial of service (do","CVE":"CVE-2025-49794","Year":"2025"},"notes":[{"CveYear":"2025","CveId":"49794","Ordinal":"1","NoteData":"A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path=\"...\"/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.","Type":"Description","Title":"Libxml: heap use after free (uaf) leads to denial of service (do"}]}}}