Description

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

INFO

Published Date :

2025-06-12T12:49:16.157Z

Last Modified :

2026-03-24T11:28:32.594Z

Source :

redhat
AFFECTED PRODUCTS

The following products are affected by CVE-2025-6021 vulnerability.

Vendors Products
Redhat
  • Discovery
  • Enterprise Linux
  • Enterprise Linux Eus
  • Enterprise Linux For Arm 64
  • Enterprise Linux For Arm 64 Eus
  • Enterprise Linux For Ibm Z Systems
  • Enterprise Linux For Ibm Z Systems Eus
  • Enterprise Linux For Power Little Endian
  • Enterprise Linux For Power Little Endian Eus
  • Enterprise Linux Server
  • Enterprise Linux Server Aus
  • Enterprise Linux Server For Power Little Endian Update Services For Sap Solutions
  • Enterprise Linux Server Tus
  • In-vehicle Operating System
  • Insights Proxy
  • Jboss Core Services
  • Openshift
  • Openshift Container Platform
  • Openshift Container Platform For Arm64
  • Openshift Container Platform For Ibm Z
  • Openshift Container Platform For Linuxone
  • Openshift Container Platform For Power
  • Rhel Aus
  • Rhel E4s
  • Rhel Els
  • Rhel Eus
  • Rhel Eus Long Life
  • Rhel Tus
Xmlsoft
  • Libxml2
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-6021.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact