vulnerability
Rocky Linux: CVE-2025-49794: libxml2 (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 9 | (AV:N/AC:L/Au:N/C:N/I:C/A:C) | Oct 4, 2025 | Feb 5, 2026 | Feb 5, 2026 |
Severity
9
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:C)
Published
Oct 4, 2025
Added
Feb 5, 2026
Modified
Feb 5, 2026
Description
A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as input for libxml, resulting in the program's crash using libxml or other possible undefined behaviors.
Solutions
rocky-upgrade-libxml2rocky-upgrade-libxml2-debuginforocky-upgrade-libxml2-debugsourcerocky-upgrade-libxml2-develrocky-upgrade-libxml2-staticrocky-upgrade-python3-libxml2rocky-upgrade-python3-libxml2-debuginfo
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.