CVE-2025-6021

Published: June 13, 2025Last modified: November 21, 2025

Description

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Severity score breakdown

ParameterValue
Base score7.5
Attack VectorNETWORK
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSlibxml2Fixed (2.10.4-r5)
25 LTSlibxml2Fixed (2.13.8-r1)
Streamlibxml2Fixed (2.13.8-r1)
Hardened Containers23 LTSlibxml2Fixed (2.10.4-r5)
Streamlibxml2Fixed (2.13.8-r1)
Liberica JDK8jdk-fullFixed (8u472+11)
jre-fullFixed (8u472+11)
11jdk-fullFixed (11.0.29+12)
jre-fullFixed (11.0.29+12)
17jdk-fullFixed (17.0.17+15)
jdk-liteFixed (17.0.17+15)
jre-fullFixed (17.0.17+15)
21jdk-fullFixed (21.0.9+15)
jdk-liteFixed (21.0.9+15)
jre-fullFixed (21.0.9+15)
25jdk-fullFixed (25.0.1+13)
jdk-liteFixed (25.0.1+13)
jre-fullFixed (25.0.1+13)

References

Published BELL-SAs

ON THIS PAGE