{"id":"JLSEC-2025-196","summary":"A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calcula...","details":"A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.","modified":"2025-12-01T23:09:11.005473Z","published":"2025-10-28T13:50:46.694Z","upstream":["CVE-2025-6021"],"database_specific":{"license":"CC-BY-4.0","sources":[{"imported":"2025-11-29T03:32:14.613Z","id":"CVE-2025-6021","html_url":"https://nvd.nist.gov/vuln/detail/CVE-2025-6021","published":"2025-06-12T13:15:25.590Z","modified":"2025-11-29T01:16:03.137Z","url":"https://services.nvd.nist.gov/rest/json/cves/2.0?cveId=CVE-2025-6021"}]},"references":[{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:10630"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:10698"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:10699"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:11580"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:11673"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12098"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12099"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12199"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12237"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12239"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12240"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:12241"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13267"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13289"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13325"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13335"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:13336"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:14059"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:14396"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:15308"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:15672"},{"type":"WEB","url":"https://access.redhat.com/errata/RHSA-2025:19020"},{"type":"WEB","url":"https://access.redhat.com/security/cve/CVE-2025-6021"},{"type":"WEB","url":"https://bugzilla.redhat.com/show_bug.cgi?id=2372406"},{"type":"WEB","url":"https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html"},{"type":"WEB","url":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/926"}],"affected":[{"package":{"name":"XML2_jll","ecosystem":"Julia","purl":"pkg:julia/XML2_jll?uuid=02c8fc9c-b97f-50b9-bbe4-9be30ff0a78a"},"ranges":[{"type":"SEMVER","events":[{"introduced":"0"},{"fixed":"2.14.4+0"}]}],"database_specific":{"source":"https://github.com/JuliaLang/SecurityAdvisories.jl/tree/generated/osv/2025/JLSEC-2025-196.json"}}],"schema_version":"1.7.3"}