9.1
CVE-2025-49794
- EPSS 0.26%
- Veröffentlicht 16.06.2025 15:24:31
- Zuletzt bearbeitet 22.11.2025 03:15:48
- Quelle secalert@redhat.com
- CVE-Watchlists
- Unerledigt
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
Collection URLhttps://gitlab.gnome.org/GNOME/libxml2/
≫
Paket
libxml2
Default Statusunaffected
Version <
2.15.0
Version
0
Status
affected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 10
Default Statusaffected
Version <
*
Version
0:2.12.5-7.el10_0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 7 Extended Lifecycle Support
Default Statusaffected
Version <
*
Version
0:2.9.1-6.el7_9.10
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
0:2.9.7-21.el8_10.1
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8
Default Statusaffected
Version <
*
Version
0:2.9.7-21.el8_10.1
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.2 Advanced Update Support
Default Statusaffected
Version <
*
Version
0:2.9.7-9.el8_2.3
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
Default Statusaffected
Version <
*
Version
0:2.9.7-9.el8_4.6
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
Default Statusaffected
Version <
*
Version
0:2.9.7-9.el8_4.6
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
Default Statusaffected
Version <
*
Version
0:2.9.7-13.el8_6.10
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.6 Telecommunications Update Service
Default Statusaffected
Version <
*
Version
0:2.9.7-13.el8_6.10
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
0:2.9.7-13.el8_6.10
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.8 Telecommunications Update Service
Default Statusaffected
Version <
*
Version
0:2.9.7-16.el8_8.9
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
0:2.9.7-16.el8_8.9
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:2.9.13-10.el9_6
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9
Default Statusaffected
Version <
*
Version
0:2.9.13-10.el9_6
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
0:2.9.13-1.el9_0.5
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
Default Statusaffected
Version <
*
Version
0:2.9.13-3.el9_2.7
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 9.4 Extended Update Support
Default Statusaffected
Version <
*
Version
0:2.9.13-10.el9_4
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat JBoss Core Services 2.4.62.SP2
Default Statusunaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.12
Default Statusaffected
Version <
*
Version
412.86.202510291903-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.13
Default Statusaffected
Version <
*
Version
413.92.202510150118-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.14
Default Statusaffected
Version <
*
Version
414.92.202510211419-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.17
Default Statusaffected
Version <
*
Version
417.94.202510112152-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.18
Default Statusaffected
Version <
*
Version
418.94.202510230424-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.19
Default Statusaffected
Version <
*
Version
4.19.9.6.202510140714-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat OpenShift Container Platform 4.20
Default Statusaffected
Version <
*
Version
4.20.9.6.202509251656-0
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Web Terminal 1.11 on RHEL 9
Default Statusaffected
Version <
*
Version
1.11-19
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Web Terminal 1.11 on RHEL 9
Default Statusaffected
Version <
*
Version
1.11-8
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Web Terminal 1.12 on RHEL 9
Default Statusaffected
Version <
*
Version
1.12-4
Status
unaffected
HerstellerRed Hat
≫
Produkt
cert-manager operator for Red Hat OpenShift 1.16
Default Statusaffected
Version <
*
Version
sha256:330e8b5ab4841a21f8f5f23cc7fb192197872f11639b12bf4b1e70831f636323
Status
unaffected
HerstellerRed Hat
≫
Produkt
File Integrity Operator 1
Default Statusaffected
Version <
*
Version
sha256:59fcdf4ea159ba76fdb582011263672646dd9d63304a91592c0a21d0f43986a4
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Insights proxy 1.5
Default Statusaffected
Version <
*
Version
sha256:c26d589f12647890b67aaa986f54d3f7c6f7f2563fb5a73f38d559e6138739d7
Status
unaffected
HerstellerRed Hat
≫
Produkt
Red Hat Enterprise Linux 6
Default Statusunknown
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.26% | 0.495 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| secalert@redhat.com | 9.1 | 3.9 | 5.2 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
|
CWE-825 Expired Pointer Dereference
The product dereferences a pointer that contains a location for memory that was previously valid, but is no longer valid.