A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Type | CWE ID | Description |
---|---|---|
CWE | CWE-825 | Expired Pointer Dereference |
Version | Base score | Base severity | Vector |
---|---|---|---|
3.1 | 9.1 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
CAPEC ID | Description |
---|
There's no available mitigation other than avoid processing untrusted XML documents before updating to the libxml version containing the fix.
Event | Date |
---|---|
Reported to Red Hat. | 2025-06-11 21:33:43 |
Made public. | 2025-06-10 00:00:00 |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|