CVE-2025-6021

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 66%
VendorProductVersion
xmlsoftlibxml2
𝑥
< 2.14.4
redhatjboss_core_services
-
redhatopenshift_container_platform
4.12
redhatopenshift_container_platform
4.13
redhatopenshift_container_platform
4.14
redhatopenshift_container_platform
4.15
redhatopenshift_container_platform
4.16
redhatopenshift_container_platform
4.17
redhatopenshift_container_platform
4.18
redhatopenshift_container_platform_for_arm64
4.13
redhatopenshift_container_platform_for_arm64
4.14
redhatopenshift_container_platform_for_arm64
4.15
redhatopenshift_container_platform_for_arm64
4.16
redhatopenshift_container_platform_for_arm64
4.17
redhatopenshift_container_platform_for_arm64
4.18
redhatopenshift_container_platform_for_ibm_z
4.13
redhatopenshift_container_platform_for_ibm_z
4.14
redhatopenshift_container_platform_for_ibm_z
4.15
redhatopenshift_container_platform_for_ibm_z
4.16
redhatopenshift_container_platform_for_ibm_z
4.17
redhatopenshift_container_platform_for_ibm_z
4.18
redhatopenshift_container_platform_for_linuxone
4.13
redhatopenshift_container_platform_for_linuxone
4.14
redhatopenshift_container_platform_for_linuxone
4.15
redhatopenshift_container_platform_for_linuxone
4.16
redhatopenshift_container_platform_for_linuxone
4.17
redhatopenshift_container_platform_for_linuxone
4.18
redhatopenshift_container_platform_for_power
4.13
redhatopenshift_container_platform_for_power
4.14
redhatopenshift_container_platform_for_power
4.15
redhatopenshift_container_platform_for_power
4.16
redhatopenshift_container_platform_for_power
4.17
redhatopenshift_container_platform_for_power
4.18
redhatenterprise_linux
8.0
redhatenterprise_linux
9.0
redhatenterprise_linux
10.0
redhatenterprise_linux_eus
8.4
redhatenterprise_linux_eus
8.6
redhatenterprise_linux_eus
8.8
redhatenterprise_linux_eus
9.4
redhatenterprise_linux_eus
9.6
redhatenterprise_linux_eus
10.0
redhatenterprise_linux_for_arm_64
8.0_aarch64:_aarch64
redhatenterprise_linux_for_arm_64
9.0_aarch64:_aarch64
redhatenterprise_linux_for_arm_64
9.4_aarch64:_aarch64
redhatenterprise_linux_for_arm_64
10.0_aarch64:_aarch64
redhatenterprise_linux_for_arm_64_eus
9.4_aarch64:_aarch64
redhatenterprise_linux_for_arm_64_eus
9.6_aarch64:_aarch64
redhatenterprise_linux_for_arm_64_eus
10.0_aarch64:_aarch64
redhatenterprise_linux_for_ibm_z_systems
8.0_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems
9.4_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems
10.0_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
9.0_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
9.4_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
9.6_s390x:_s390x
redhatenterprise_linux_for_ibm_z_systems_eus
10.0_s390x:_s390x
redhatenterprise_linux_for_power_little_endian
8.0_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian
9.0_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian
10.0_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
9.4_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
9.6_ppc64le:_ppc64le
redhatenterprise_linux_for_power_little_endian_eus
10.0_ppc64le:_ppc64le
redhatenterprise_linux_server
7.0
redhatenterprise_linux_server_aus
8.2
redhatenterprise_linux_server_aus
8.4
redhatenterprise_linux_server_aus
8.6
redhatenterprise_linux_server_aus
9.2
redhatenterprise_linux_server_aus
9.4
redhatenterprise_linux_server_aus
9.6
redhatenterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions
9.4_ppc64le:_ppc64le
redhatenterprise_linux_server_tus
8.8
redhatin-vehicle_operating_system
1.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libxml2
bullseye
vulnerable
bullseye (security)
2.9.10+dfsg-6.7+deb11u9
fixed
bookworm
2.9.14+dfsg-1.3~deb12u4
fixed
bookworm (security)
2.9.14+dfsg-1.3~deb12u4
fixed
trixie (security)
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
trixie
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
forky
2.14.6+dfsg-0.1
fixed
sid
2.15.1+dfsg-0.3
fixed