A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other possible undefined behavior due to sensitive data being corrupted in memory.
Type | CWE ID | Description |
---|---|---|
CWE | CWE-125 | Out-of-bounds Read |
Version | Base score | Base severity | Vector |
---|---|---|---|
3.1 | 9.1 | CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H |
CAPEC ID | Description |
---|
There's no available mitigation other than to avoid processing untrusted XML documents if the user is unable/unwilling to update the library.
Event | Date |
---|---|
Reported to Red Hat. | 2025-06-12 00:35:26 |
Made public. | 2025-06-11 00:00:00 |
Version | Base score | Base severity | Vector |
---|
CAPEC ID | Description |
---|
Event | Date |
---|
Hyperlink | Resource |
---|