๐Ÿ” CVE Alert

CVE-2025-6021

HIGH 7.5

Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2

CVSS Score
7.5
EPSS Score
2.1%
EPSS Percentile
84th

A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

CWE CWE-787
Published Jun 12, 2025
Last Updated Apr 14, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new high vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Affected Versions

Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux 7 Extended Lifecycle Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8
All versions affected
Red Hat / Red Hat Enterprise Linux 8.2 Advanced Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.4 Extended Update Support Long-Life Add-On
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Telecommunications Update Service
All versions affected
Red Hat / Red Hat Enterprise Linux 8.8 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9
All versions affected
Red Hat / Red Hat Enterprise Linux 9.0 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.2 Update Services for SAP Solutions
All versions affected
Red Hat / Red Hat Enterprise Linux 9.4 Extended Update Support
All versions affected
Red Hat / Red Hat JBoss Core Services 2.4.62.SP2
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.12
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.13
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.14
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.15
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.16
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.17
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.18
All versions affected
Red Hat / Red Hat OpenShift Container Platform 4.19
All versions affected
Red Hat / Red Hat Discovery 2
All versions affected
Red Hat / Red Hat Insights proxy 1.5
All versions affected
Red Hat / Red Hat Enterprise Linux 6
All versions affected
Red Hat / Red Hat Hardened Images
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:10630 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:10698 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:10699 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:11580 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:11673 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12098 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12099 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12199 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12237 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12239 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12240 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12241 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:13267 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:13289 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:13325 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:13335 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:13336 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14059 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:14396 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15308 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:15672 access.redhat.com: https://access.redhat.com/errata/RHSA-2025:19020 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-6021 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2372406 gitlab.gnome.org: https://gitlab.gnome.org/GNOME/libxml2/-/issues/926 lists.debian.org: https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html

Credits

Red Hat would like to thank Ahmed Lekssays for reporting this issue.