We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
Reserved 2025-06-10 | Published 2025-06-16 | Updated 2025-06-16 | Assigner redhat2025-06-12: | Reported to Red Hat. |
2025-06-11: | Made public. |
access.redhat.com/security/cve/CVE-2025-49796
bugzilla.redhat.com/show_bug.cgi?id=2372385 (RHBZ#2372385)
Support options