UBUNTU-CVE-2025-49795

Source
https://ubuntu.com/security/CVE-2025-49795
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49795.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2025-49795
Upstream
Published
2025-06-16T16:15:00Z
Modified
2025-11-26T08:09:49.295986Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H CVSS Calculator
  • Ubuntu - medium
Summary
[none]
Details

A NULL pointer dereference vulnerability was found in libxml2 when processing XPath XML expressions. This flaw allows an attacker to craft a malicious XML input to libxml2, leading to a denial of service.

References

Affected packages

Ubuntu:25.10 / libxml2

Package

Name
libxml2
Purl
pkg:deb/ubuntu/libxml2@2.14.5+dfsg-0.2?arch=source&distro=questing

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.14.5+dfsg-0.2

Affected versions

2.*

2.12.7+dfsg+really2.9.14-0.4
2.12.7+dfsg+really2.9.14-0.4ubuntu0.1
2.12.7+dfsg+really2.9.14-1
2.14.3+dfsg-0exp1
2.14.3+dfsg-0exp2
2.14.3+dfsg-0exp3
2.14.4+dfsg-0exp1
2.14.5+dfsg-0exp1
2.14.5+dfsg-0exp2
2.14.5+dfsg-0.1

Ecosystem specific

{
    "binaries": [
        {
            "binary_name": "libxml2-16",
            "binary_version": "2.14.5+dfsg-0.2"
        },
        {
            "binary_name": "libxml2-dev",
            "binary_version": "2.14.5+dfsg-0.2"
        },
        {
            "binary_name": "libxml2-utils",
            "binary_version": "2.14.5+dfsg-0.2"
        },
        {
            "binary_name": "python3-libxml2",
            "binary_version": "2.14.5+dfsg-0.2"
        }
    ],
    "availability": "No subscription required"
}

Database specific

source

"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2025/UBUNTU-CVE-2025-49795.json"