Buffer Overflow Detected in libxml2 Impacting Red Hat Programs
CVE-2025-6021
7.5HIGH
Key Information:
- Vendor
Red Hat
- Status
- Vendor
- CVE Published:
- 12 June 2025
What is CVE-2025-6021?
A vulnerability exists in the xmlBuildQName function of libxml2, where improper calculations of buffer sizes due to integer overflows can result in a stack-based buffer overflow. Attackers can exploit this flaw by supplying specially crafted input, ultimately leading to memory corruption or causing a denial of service in applications using vulnerable versions of libxml2.
Affected Version(s)
Red Hat Discovery 2 sha256:ad07f55ee75fb20310c88f154a04665bd8465d138d66c665c300f61447858344
Red Hat Enterprise Linux 10 0:2.12.5-7.el10_0
Red Hat Enterprise Linux 7 Extended Lifecycle Support 0:2.9.1-6.el7_9.10
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Red Hat would like to thank Ahmed Lekssays for reporting this issue.