Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2025-6021

Опубликовано: 12 июн. 2025
Источник: redhat
CVSS3: 7.5

Описание

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

Отчет

This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it’s a write overflow, modern mitigations make remote code execution unlikely.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10libxml2Affected
Red Hat Enterprise Linux 6libxml2Out of support scope
Red Hat Enterprise Linux 7libxml2Affected
Red Hat Enterprise Linux 8libxml2Affected
Red Hat Enterprise Linux 9libxml2Affected
Red Hat JBoss Core Serviceslibxml2Affected
Red Hat OpenShift Container Platform 4rhcosAffected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-190
Дефект:
CWE-121
https://bugzilla.redhat.com/show_bug.cgi?id=2372406libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
3 дня назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
nvd
6 дней назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CVSS3: 7.5
debian
6 дней назад

A flaw was found in libxml2's xmlBuildQName function, where integer ov ...

CVSS3: 7.5
github
6 дней назад

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

7.5 High

CVSS3