A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-190 | |
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Thu, 12 Jun 2025 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Thu, 12 Jun 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. | |
Title | Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2 | |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat jboss Core Services Redhat openshift |
|
Weaknesses | CWE-121 | |
CPEs | cpe:/a:redhat:jboss_core_services:1 cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat jboss Core Services Redhat openshift |
|
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-06-12T12:49:16.157Z
Updated: 2025-06-12T13:16:31.182Z
Reserved: 2025-06-12T05:52:54.211Z
Link: CVE-2025-6021

Updated: 2025-06-12T13:16:27.105Z

Status : Awaiting Analysis
Published: 2025-06-12T13:15:25.590
Modified: 2025-06-12T16:06:20.180
Link: CVE-2025-6021
