A flaw was found in the xmlSetTreeDoc() function of the libxml2 XML parsing library. This function is responsible for updating document pointers when XML nodes are moved between documents. Due to improper handling of namespace references, a namespace pointer may remain linked to a freed memory region when the original document is destroyed. As a result, subsequent operations that access the namespace can lead to a use-after-free condition, causing an application crash.
Metrics
Affected Vendors & Products
References
History
Sat, 08 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Fri, 07 Nov 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the xmlSetTreeDoc() function of the libxml2 XML parsing library. This function is responsible for updating document pointers when XML nodes are moved between documents. Due to improper handling of namespace references, a namespace pointer may remain linked to a freed memory region when the original document is destroyed. As a result, subsequent operations that access the namespace can lead to a use-after-free condition, causing an application crash. | |
| Title | Libxml2: namespace use-after-free in xmlsettreedoc() function of libxml2 | |
| First Time appeared |
Redhat
Redhat enterprise Linux Redhat jboss Core Services Redhat openshift |
|
| Weaknesses | CWE-416 | |
| CPEs | cpe:/a:redhat:jboss_core_services:1 cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
| Vendors & Products |
Redhat
Redhat enterprise Linux Redhat jboss Core Services Redhat openshift |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published: 2025-11-07T20:59:35.021Z
Updated: 2025-11-07T21:24:25.515Z
Reserved: 2025-11-07T10:30:42.765Z
Link: CVE-2025-12863
Updated: 2025-11-07T21:24:17.820Z
Status : Received
Published: 2025-11-07T21:15:40.393
Modified: 2025-11-07T21:15:40.393
Link: CVE-2025-12863