A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
Workaround:
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Link | Tags |
---|---|
https://access.redhat.com/errata/RHSA-2025:10630 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10698 | vendor advisory |
https://access.redhat.com/errata/RHSA-2025:10699 | vendor advisory |
https://access.redhat.com/security/cve/CVE-2025-6021 | vdb entry |
https://bugzilla.redhat.com/show_bug.cgi?id=2372406 | issue tracking |