CVE-2025-6021

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
redhatCNA
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CISA-ADPADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 26%
Debian logo
Debian Releases
Debian Product
Codename
libxml2
bullseye
vulnerable
bullseye (security)
2.9.10+dfsg-6.7+deb11u8
fixed
bookworm
2.9.14+dfsg-1.3~deb12u4
fixed
bookworm (security)
2.9.14+dfsg-1.3~deb12u4
fixed
trixie (security)
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
trixie
2.12.7+dfsg+really2.9.14-2.1+deb13u1
fixed
forky
2.14.5+dfsg-0.2
fixed
sid
2.14.5+dfsg-0.2
fixed