CVE-2025-49796

A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
redhatCNA
9.1 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 62%
Debian logo
Debian Releases
Debian Product
Codename
libxml2
bullseye
vulnerable
bullseye (security)
2.9.10+dfsg-6.7+deb11u9
fixed
bookworm
2.9.14+dfsg-1.3~deb12u4
fixed
bookworm (security)
2.9.14+dfsg-1.3~deb12u4
fixed
trixie (security)
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
trixie
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
forky
2.14.6+dfsg-0.1
fixed
sid
2.15.1+dfsg-0.3
fixed