HomeXmlsoftCVE-2025-6021

CVE-2025-6021

HIGH
7.5CVSS
Published: 2025-06-12
Updated: 2026-02-06
AI Analysis

Description

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
none
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-190CWE-787

Metadata

Primary Vendor
XMLSOFT
Published
6/12/2025
Last Modified
2/6/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

xmlsoft : libxml2redhat : jboss_core_servicesredhat : openshift_container_platformredhat : openshift_container_platformredhat : openshift_container_platformredhat : openshift_container_platformredhat : openshift_container_platformredhat : openshift_container_platformredhat : openshift_container_platformredhat : openshift_container_platform_for_arm64redhat : openshift_container_platform_for_arm64redhat : openshift_container_platform_for_arm64redhat : openshift_container_platform_for_arm64redhat : openshift_container_platform_for_arm64redhat : openshift_container_platform_for_arm64redhat : openshift_container_platform_for_ibm_zredhat : openshift_container_platform_for_ibm_zredhat : openshift_container_platform_for_ibm_zredhat : openshift_container_platform_for_ibm_zredhat : openshift_container_platform_for_ibm_zredhat : openshift_container_platform_for_ibm_zredhat : openshift_container_platform_for_linuxoneredhat : openshift_container_platform_for_linuxoneredhat : openshift_container_platform_for_linuxoneredhat : openshift_container_platform_for_linuxoneredhat : openshift_container_platform_for_linuxoneredhat : openshift_container_platform_for_linuxoneredhat : openshift_container_platform_for_powerredhat : openshift_container_platform_for_powerredhat : openshift_container_platform_for_powerredhat : openshift_container_platform_for_powerredhat : openshift_container_platform_for_powerredhat : openshift_container_platform_for_powerredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linuxredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_eusredhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64redhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_arm_64_eusredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systemsredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_ibm_z_systems_eusredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endianredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_for_power_little_endian_eusredhat : enterprise_linux_serverredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_ausredhat : enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutionsredhat : enterprise_linux_server_tusredhat : in-vehicle_operating_system

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-6021 | HIGH Severity | CVEDatabase.com | CVEDatabase.com