{"id":"BIT-java-min-2025-6021","summary":"Libxml2: integer overflow in xmlbuildqname() leads to stack buffer overflow in libxml2","details":"A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.","aliases":["BIT-java-2025-6021","BIT-jre-2025-6021","CVE-2025-6021"],"modified":"2026-05-13T12:17:44.852459Z","published":"2026-05-06T14:45:46.094Z","database_specific":{"severity":"High","cpes":["cpe:2.3:a:bellsoft:libericajdk:*:*:*:*:*:*:*:*"]},"references":[{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:10630"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:10698"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:10699"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:11580"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:11673"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12098"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12099"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12199"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12237"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12239"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12240"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12241"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13267"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13289"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13325"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13335"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13336"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:14059"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:14396"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:15308"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:15672"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:19020"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2026:7519"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-6021"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2372406"},{"type":"WEB","url":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/926"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6021"},{"type":"WEB","url":"https://cert-portal.siemens.com/productcert/html/ssa-032379.html"}],"affected":[{"package":{"name":"java-min","ecosystem":"Bitnami","purl":"pkg:bitnami/java-min"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"1.8.0"},{"introduced":"1.9.0"},{"fixed":"8.0.481"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/java-min/BIT-java-min-2025-6021.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}],"schema_version":"1.7.5"}