๐Ÿ” CVE Alert

CVE-2025-49796

CRITICAL 9.1

Libxml: type confusion leads to denial of service (dos)

CVSS Score
9.1
EPSS Score
1.8%
EPSS Percentile
83th

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.

CWE CWE-125
Published Jun 16, 2025
Last Updated Apr 15, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new critical vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat JBoss Core Services 2.4.62.SP2
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.12
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.19
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.20
All versions affected
Red Hat / Red Hat Web Terminal 1.11 on RHEL 9
All versions affected
Red Hat / Red Hat Web Terminal 1.11 on RHEL 9
All versions affected
Red Hat / Red Hat Web Terminal 1.12 on RHEL 9
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / RHOSS-1.36-RHEL-8
All versions affected
Red Hat / cert-manager operator for Red Hat OpenShift 1.16
All versions affected
Red Hat / File Integrity Operator 1
All versions affected
Red Hat / Red Hat Discovery 2
All versions affected
Red Hat / Red Hat Insights proxy 1.5
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Hardened Images
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:10630 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:10698 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:10699 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:11580 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12098 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12099 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12199 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12237 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12239 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12240 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12241 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:13267 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:13335 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15397 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15827 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15828 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18217 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18218 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18219 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:18240 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19020 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19041 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19046 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19894 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:21913 access.redhat.com: https://access.redhat.com/errata/RHSA-2026:0934 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-49796 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2372385 gitlab.gnome.org: https://gitlab.gnome.org/GNOME/libxml2/-/issues/933 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html