Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-6021

Опубликовано: 12 июн. 2025
Источник: debian
EPSS Низкий

Описание

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libxml2fixed2.12.7+dfsg+really2.9.14-2package
libxml2no-dsabookwormpackage

Примечания

  • https://gitlab.gnome.org/GNOME/libxml2/-/issues/926

  • Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/ad346c9a249c4b380bf73c460ad3e81135c5d781 (master)

  • Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/acbbeef9f5dcdcc901c5f3fa14d583ef8cfd22f0 (2.14-branch)

EPSS

Процентиль: 40%
0.00183
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
redhat
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
nvd
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
github
около 2 месяцев назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
fstec
около 2 месяцев назад

Уязвимость функции xmlBuildQName библиотеки Libxml2, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 40%
0.00183
Низкий