{"dataType": "CVE_RECORD", "containers": {"adp": [{"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "redhat", "product": "libxml2", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "libxml2-devel", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "libxml2-python", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}, {"vendor": "redhat", "product": "libxml2-static", "platforms": ["cpe:/o:redhat:enterprise_linux:6"], "defaultStatus": "affected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input. \n            This vulnerability is rated Moderate due to the lack of confidentiality impact and limited integrity concerns, with the main risk being potential denial-of-service  from a crash. Exploitation requires crafted XML input and specific application behavior using xmlBuildQName. While it’s a write overflow, modern mitigations make remote code execution unlikely.\n            Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base, or stability. Users are strongly advised to apply vendor-supplied patches as soon as they become available to address the underlying integer overflow flaw in the affected code."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-12T00:00:00Z", "x_subShortName": "redhat_6"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"medium\"}"}}}], "affected": [{"vendor": "canonical", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.4+dfsg1-6.1ubuntu1.9+esm4", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.4+dfsg1-6.1ubuntu1.9+esm4", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.4+dfsg1-6.1ubuntu1.9+esm4", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.4+dfsg1-6.1ubuntu1.9+esm4", "versionType": "custom"}], "platforms": ["bionic"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.10+dfsg-5ubuntu0.20.04.10+esm1", "versionType": "custom"}], "platforms": ["focal"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.10+dfsg-5ubuntu0.20.04.10+esm1", "versionType": "custom"}], "platforms": ["focal"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.10+dfsg-5ubuntu0.20.04.10+esm1", "versionType": "custom"}], "platforms": ["focal"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.10+dfsg-5ubuntu0.20.04.10+esm1", "versionType": "custom"}], "platforms": ["focal"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13+dfsg-1ubuntu0.8", "versionType": "custom"}], "platforms": ["jammy"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13+dfsg-1ubuntu0.8", "versionType": "custom"}], "platforms": ["jammy"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13+dfsg-1ubuntu0.8", "versionType": "custom"}], "platforms": ["jammy"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14+dfsg-1.3ubuntu3.4", "versionType": "custom"}], "platforms": ["noble"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14+dfsg-1.3ubuntu3.4", "versionType": "custom"}], "platforms": ["noble"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14+dfsg-1.3ubuntu3.4", "versionType": "custom"}], "platforms": ["noble"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.1+dfsg1-3ubuntu4.13+esm8", "versionType": "custom"}], "platforms": ["trusty"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.1+dfsg1-3ubuntu4.13+esm8", "versionType": "custom"}], "platforms": ["trusty"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.1+dfsg1-3ubuntu4.13+esm8", "versionType": "custom"}], "platforms": ["trusty"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.3+dfsg1-1ubuntu0.7+esm9", "versionType": "custom"}], "platforms": ["xenial"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.3+dfsg1-1ubuntu0.7+esm9", "versionType": "custom"}], "platforms": ["xenial"], "defaultStatus": "unaffected"}, {"vendor": "canonical", "product": "python-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.3+dfsg1-1ubuntu0.7+esm9", "versionType": "custom"}], "platforms": ["xenial"], "defaultStatus": "unaffected"}], "references": [{"url": "https://ubuntu.com/security/CVE-2025-6021"}, {"url": "https://ubuntu.com/security/notices/USN-7694-1"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integeroverflows in buffer size calculations can lead to a stack-based bufferoverflow. This issue can result in memory corruption or a denial of servicewhen processing crafted input."}], "providerMetadata": {"orgId": "cc1ad9ee-3454-478d-9317-d3e869d708bc", "shortName": "canonical", "dateUpdated": "2025-06-12T13:15:00Z", "x_subShortName": "canonical"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"not yet assigned\"}"}}}], "affected": [{"vendor": "debian", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-dev", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-utils-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "python3-libxml2-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.14+dfsg-1.3~deb12u3", "versionType": "deb"}], "platforms": ["bookworm"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-dev", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-utils-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "python3-libxml2-dbg", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.10+dfsg-6.7+deb11u8", "versionType": "deb"}], "platforms": ["bullseye"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-dev", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-utils", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "libxml2-utils-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}, {"vendor": "debian", "product": "python3-libxml2-dbgsym", "versions": [{"status": "affected", "version": "0", "lessThan": "2.12.7+dfsg+really2.9.14-2", "versionType": "deb"}], "platforms": ["forky", "sid", "trixie"], "defaultStatus": "unaffected"}], "references": [{"url": "https://security-tracker.debian.org/tracker/CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input."}], "providerMetadata": {"orgId": "79363d38-fa19-49d1-9214-5f28da3f3ac5", "shortName": "debian", "dateUpdated": "2025-07-26T00:00:00.000Z", "x_subShortName": "debian"}}, {"credits": [{"lang": "en", "value": "packager@almalinux.org"}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "almalinux", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:10"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:10"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "libxml2-static", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:10"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:10"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-6021", "name": "CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "The libxml2 library is a development toolbox providing the implementation of various XML standards.  \n\nSecurity Fix(es):  \n\n  * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n  * libxml: Null pointer dereference leads to Denial of service (DoS) (CVE-2025-49795)\n  * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n  * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n"}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000001", "shortName": "almalinux", "dateUpdated": "2025-07-08T00:00:00Z", "x_subShortName": "alma_10"}}, {"credits": [{"lang": "en", "value": "packager@almalinux.org"}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "almalinux", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-6021", "name": "CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "The libxml2 library is a development toolbox providing the implementation of various XML standards.  \n\nSecurity Fix(es):  \n\n  * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n  * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n  * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n"}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000001", "shortName": "almalinux", "dateUpdated": "2025-07-09T00:00:00Z", "x_subShortName": "alma_8"}}, {"credits": [{"lang": "en", "value": "packager@almalinux.org"}], "metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "almalinux", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:9"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:9"], "defaultStatus": "unaffected"}, {"vendor": "almalinux", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:almalinux:almalinux:9"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-6021", "name": "CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "The libxml2 library is a development toolbox providing the implementation of various XML standards.  \n\nSecurity Fix(es):  \n\n  * libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n  * libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n  * libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n"}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000001", "shortName": "almalinux", "dateUpdated": "2025-07-09T00:00:00Z", "x_subShortName": "alma_9"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"IMPORTANT\"}"}}}], "affected": [{"vendor": "oraclelinux", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:10"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:10"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2-static", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:10"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:10"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.1-6.0.7.el7_9.6", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:7"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.1-6.0.7.el7_9.6", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:7"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2-python", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.1-6.0.7.el7_9.6", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:7"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2-static", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.1-6.0.7.el7_9.6", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:7"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:8"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:9"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:9"], "defaultStatus": "unaffected"}, {"vendor": "oraclelinux", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:oracle:linux:9"], "defaultStatus": "unaffected"}], "references": [{"url": "https://linux.oracle.com/cve/CVE-2025-6021.html"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000006", "shortName": "oraclelinux", "dateUpdated": "2025-07-08T00:00:00Z", "x_subShortName": "oraclelinux"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Moderate\"}"}}}], "affected": [{"vendor": "redhat", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "libxml2-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "libxml2-static", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "python3-libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:10"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/security/cve/CVE-2025-6021"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"}, {"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/926"}, {"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-6021"}, {"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-12T00:00:00Z", "x_subShortName": "redhat_10"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:8"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2025:10698"}, {"url": "https://access.redhat.com/security/cve/CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-12T00:00:00Z", "x_subShortName": "redhat_8"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "redhat", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}, {"vendor": "redhat", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:redhat:enterprise_linux:9"], "defaultStatus": "unaffected"}], "references": [{"url": "https://access.redhat.com/errata/RHSA-2025:10699"}, {"url": "https://access.redhat.com/security/cve/CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml: Heap use after free (UAF) leads to Denial of service (DoS) (CVE-2025-49794)\n\n* libxml: Type confusion leads to Denial of service (DoS) (CVE-2025-49796)\n\n* libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section."}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2025-06-12T00:00:00Z", "x_subShortName": "redhat_9"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "rocky", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-static", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.5-7.el10_0", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:10"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-21.el8_10.1", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:8"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:9"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:9"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:9"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:9"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:9"], "defaultStatus": "unaffected"}, {"vendor": "rocky", "product": "python3-libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.13-10.el9_6", "versionType": "rpm"}], "platforms": ["cpe:/o:rocky:rocky:9"], "defaultStatus": "unaffected"}], "references": [{"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372373"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372379"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372385"}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406"}], "descriptions": [{"lang": "en", "value": "libxml2: Integer Overflow in xmlBuildQName() Leads to Stack Buffer Overflow in libxml2 (CVE-2025-6021)"}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000004", "shortName": "rocky", "dateUpdated": "2025-07-29T13:38:26Z", "x_subShortName": "rocky"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "suse", "product": "gettext-runtime", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "gettext-runtime-32bit", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "gettext-tools", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libtextstyle0", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libtextstyle0-32bit", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "ruby2.5-rubygem-nokogiri", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libqt5-qtdoc", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-development-tools:15:sp6", "cpe:/o:suse:sle-module-development-tools:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libqt5-qtdoc-html", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-development-tools:15:sp6", "cpe:/o:suse:sle-module-development-tools:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libqt5-qtdoc-qch", "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-development-tools:15:sp6", "cpe:/o:suse:sle-module-development-tools:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles-ltss:15", "cpe:/o:suse:sles-ltss:15:sp1", "cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15", "cpe:/o:suse:sles:15:sp1", "cpe:/o:suse:sles:15:sp2", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp3", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14-150400.5.44.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_teradata:15:sp4"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14-150400.5.44.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_teradata:15:sp4"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14-150400.5.44.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_teradata:15:sp4"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14-150400.5.44.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_teradata:15:sp4"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14-150400.5.44.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_teradata:15:sp4"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python311-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.14-150400.5.44.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:23.4", "cpe:/o:suse:oes-release:24.4", "cpe:/o:suse:sles-ltss:15:sp4", "cpe:/o:suse:sles:15:sp4", "cpe:/o:suse:sles_sap:15:sp4", "cpe:/o:suse:sles_teradata:15:sp4"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python311-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-python3:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python311-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-python3:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles-ltss:15:sp5", "cpe:/o:suse:sles:15:sp5", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp5", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python2-libxml2-python", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-150000.3.82.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles-ltss:15:sp2"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-150000.3.82.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15:sp3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-150000.3.82.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15:sp3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-150000.3.82.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15:sp3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-150000.3.82.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15:sp3"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python3-libxml2-python", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.9.7-150000.3.82.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles-ltss:15:sp2", "cpe:/o:suse:sles-ltss:15:sp3", "cpe:/o:suse:sles:15:sp3", "cpe:/o:suse:sles_sap:15:sp3"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1244580"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021", "name": "Mitre CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html", "name": "RHSA-2025:10698"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html", "name": "RHSA-2025:10699"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html", "name": "RHSA-2025:12240"}, {"url": "https://www.suse.com/security/cve/CVE-2025-6021", "name": "SUSE CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html", "name": "SUSE-SU-2025:02260-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html", "name": "SUSE-SU-2025:02275-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html", "name": "SUSE-SU-2025:02294-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html", "name": "SUSE-SU-2025:02314-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html", "name": "SUSE-SU-2025:02355-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html", "name": "SUSE-SU-2025:20564-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html", "name": "SUSE-SU-2025:20607-1"}], "descriptions": [{"lang": "en", "value": "\n    A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-06-25T00:00:00Z", "x_subShortName": "suse_server_15"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "suse", "product": "gettext-runtime", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "gettext-runtime-32bit", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "gettext-tools", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libtextstyle0", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libtextstyle0-32bit", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "ruby2.5-rubygem-nokogiri", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-basesystem:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libqt5-qtdoc", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-development-tools:15:sp6", "cpe:/o:suse:sle-module-development-tools:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libqt5-qtdoc-html", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-development-tools:15:sp6", "cpe:/o:suse:sle-module-development-tools:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libqt5-qtdoc-qch", "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-development-tools:15:sp6", "cpe:/o:suse:sle-module-development-tools:15:sp7", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp6", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python311-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.12.10-150700.4.3.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:oes-release:25.4", "cpe:/o:suse:sle-module-python3:15:sp7", "cpe:/o:suse:sle_hpc:15:sp7", "cpe:/o:suse:sled:15:sp7", "cpe:/o:suse:sles:15:sp7", "cpe:/o:suse:sles_sap:15:sp7"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-2-32bit", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-basesystem:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python311-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.10.3-150500.5.29.1", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sle-module-python3:15:sp6", "cpe:/o:suse:sle_hpc:15:sp6", "cpe:/o:suse:sled:15:sp6", "cpe:/o:suse:sles:15:sp6", "cpe:/o:suse:sles_sap:15:sp6"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1244580"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021", "name": "Mitre CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html", "name": "RHSA-2025:10698"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html", "name": "RHSA-2025:10699"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html", "name": "RHSA-2025:12240"}, {"url": "https://www.suse.com/security/cve/CVE-2025-6021", "name": "SUSE CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html", "name": "SUSE-SU-2025:02260-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html", "name": "SUSE-SU-2025:02275-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html", "name": "SUSE-SU-2025:02294-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html", "name": "SUSE-SU-2025:02314-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html", "name": "SUSE-SU-2025:02355-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html", "name": "SUSE-SU-2025:20564-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html", "name": "SUSE-SU-2025:20607-1"}], "descriptions": [{"lang": "en", "value": "\n    A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-06-26T00:00:00Z", "x_subShortName": "suse_desktop_15"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "suse", "product": "libxml2-2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.13.8-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.13.8-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-doc", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.13.8-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "libxml2-tools", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.13.8-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}, {"vendor": "suse", "product": "python313-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "0:2.13.8-160000.2.2", "versionType": "rpm"}], "platforms": ["cpe:/o:suse:sles:16.0"], "defaultStatus": "unaffected"}], "solutions": [{"lang": "en", "value": "SUSE bug 1244580"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021", "name": "Mitre CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html", "name": "RHSA-2025:10698"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html", "name": "RHSA-2025:10699"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html", "name": "RHSA-2025:12240"}, {"url": "https://www.suse.com/security/cve/CVE-2025-6021", "name": "SUSE CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html", "name": "SUSE-SU-2025:02260-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html", "name": "SUSE-SU-2025:02275-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html", "name": "SUSE-SU-2025:02294-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html", "name": "SUSE-SU-2025:02314-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html", "name": "SUSE-SU-2025:02355-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html", "name": "SUSE-SU-2025:20564-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html", "name": "SUSE-SU-2025:20607-1"}], "descriptions": [{"lang": "en", "value": "\n    A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-11-14T00:00:00Z", "x_subShortName": "suse_server_16"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"vendor": "amazon", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.10.4-1.amzn2023.0.11", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "2.10.4-1.amzn2023.0.11", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-debugsource", "versions": [{"status": "affected", "version": "0", "lessThan": "2.10.4-1.amzn2023.0.11", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "2.10.4-1.amzn2023.0.11", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-static", "versions": [{"status": "affected", "version": "0", "lessThan": "2.10.4-1.amzn2023.0.11", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "python3-libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.10.4-1.amzn2023.0.11", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "python3-libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "2.10.4-1.amzn2023.0.11", "versionType": "rpm"}], "defaultStatus": "unaffected"}], "references": [{"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000000", "shortName": "alas", "dateUpdated": "2025-06-18T23:17:00Z", "x_subShortName": "alas_2023"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 8.1, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "HIGH", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}}], "affected": [{"vendor": "amazon", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.1-6.amzn2.5.18", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-debuginfo", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.1-6.amzn2.5.18", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-devel", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.1-6.amzn2.5.18", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-python", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.1-6.amzn2.5.18", "versionType": "rpm"}], "defaultStatus": "unaffected"}, {"vendor": "amazon", "product": "libxml2-static", "versions": [{"status": "affected", "version": "0", "lessThan": "2.9.1-6.amzn2.5.18", "versionType": "rpm"}], "defaultStatus": "unaffected"}], "references": [{"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000000", "shortName": "alas", "dateUpdated": "2025-06-18T23:14:00Z", "x_subShortName": "alas_2"}}, {"metrics": [{"other": {"type": "Unknown", "content": {"data": "{\"description\":\"High\"}"}}}], "affected": [{"vendor": "arch", "product": "libxml2", "versions": [{"status": "affected", "version": "2.14.3-1", "lessThan": "2.14.4-1", "versionType": "custom"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://security.archlinux.org/CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "The xmlBuildQName function in tree.c is vulnerable to an integer overflow when calculating the required buffer size for concatenating a prefix and a local name (ncname). The lengths of ncname and prefix are retrieved using strlen (which returns size_t) but are then implicitly cast to int variables lenn and lenp."}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000002", "shortName": "arch", "dateUpdated": "2025-06-18T23:39:05.000Z", "x_subShortName": "arch"}}, {"metrics": [{"cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}, {"other": {"type": "Unknown", "content": {"data": "{\"description\":\"Important\"}"}}}], "affected": [{"vendor": "unknown", "product": "unknown", "defaultStatus": "unknown"}], "solutions": [{"lang": "en", "value": "SUSE bug 1244580"}], "references": [{"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-6021", "name": "Mitre CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001780.html", "name": "RHSA-2025:10698"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-July/001783.html", "name": "RHSA-2025:10699"}, {"url": "https://lists.suse.com/pipermail/suse-liberty-linux-updates/2025-August/001864.html", "name": "RHSA-2025:12240"}, {"url": "https://www.suse.com/security/cve/CVE-2025-6021", "name": "SUSE CVE-2025-6021"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040658.html", "name": "SUSE-SU-2025:02260-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040677.html", "name": "SUSE-SU-2025:02275-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040694.html", "name": "SUSE-SU-2025:02294-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-July/021818.html", "name": "SUSE-SU-2025:02314-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040759.html", "name": "SUSE-SU-2025:02355-1"}, {"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-August/022316.html", "name": "SUSE-SU-2025:20564-1"}, {"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041454.html", "name": "SUSE-SU-2025:20607-1"}], "descriptions": [{"lang": "en", "value": "\n    A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.\n    "}], "providerMetadata": {"orgId": "404e59f5-483d-4b8a-8e7a-e67604dd8afb", "shortName": "suse", "dateUpdated": "2025-07-12T00:00:00Z", "x_subShortName": "suse_server_12"}}, {"affected": [{"vendor": "unknown", "product": "unknown", "defaultStatus": "unknown"}], "references": [{"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"}], "descriptions": [{"lang": "en", "value": "not defined"}], "providerMetadata": {"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat", "dateUpdated": "2000-01-01T00:00:00Z", "x_subShortName": "redhat_7"}}], "cna": {"metrics": [{"format": "CVSS", "cvssV3_1": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}}], "affected": [{"cpes": ["cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "jboss_core_services", "defaultStatus": "unknown"}, {"cpes": ["cpe:2.3:a:redhat:openshift_container_platform:4.12:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.13:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.14:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.16:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.17:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform:4.18:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "openshift_container_platform", "versions": [{"status": "affected", "version": "4.12"}, {"status": "affected", "version": "4.13"}, {"status": "affected", "version": "4.14"}, {"status": "affected", "version": "4.15"}, {"status": "affected", "version": "4.16"}, {"status": "affected", "version": "4.17"}, {"status": "affected", "version": "4.18"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.13:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.14:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.16:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.17:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_arm64:4.18:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "openshift_container_platform_for_arm64", "versions": [{"status": "affected", "version": "4.13"}, {"status": "affected", "version": "4.14"}, {"status": "affected", "version": "4.15"}, {"status": "affected", "version": "4.16"}, {"status": "affected", "version": "4.17"}, {"status": "affected", "version": "4.18"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.13:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.14:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.16:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.17:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_ibm_z:4.18:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "openshift_container_platform_for_ibm_z", "versions": [{"status": "affected", "version": "4.13"}, {"status": "affected", "version": "4.14"}, {"status": "affected", "version": "4.15"}, {"status": "affected", "version": "4.16"}, {"status": "affected", "version": "4.17"}, {"status": "affected", "version": "4.18"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.13:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.14:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.16:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.17:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_linuxone:4.18:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "openshift_container_platform_for_linuxone", "versions": [{"status": "affected", "version": "4.13"}, {"status": "affected", "version": "4.14"}, {"status": "affected", "version": "4.15"}, {"status": "affected", "version": "4.16"}, {"status": "affected", "version": "4.17"}, {"status": "affected", "version": "4.18"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:redhat:openshift_container_platform_for_power:4.13:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.14:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.15:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.16:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.17:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:openshift_container_platform_for_power:4.18:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "openshift_container_platform_for_power", "versions": [{"status": "affected", "version": "4.13"}, {"status": "affected", "version": "4.14"}, {"status": "affected", "version": "4.15"}, {"status": "affected", "version": "4.16"}, {"status": "affected", "version": "4.17"}, {"status": "affected", "version": "4.18"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:a:xmlsoft:libxml2:*:*:*:*:*:*:*:*"], "vendor": "xmlsoft", "product": "libxml2", "versions": [{"status": "affected", "version": "0", "lessThan": "2.14.4", "versionType": "custom"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux", "versions": [{"status": "affected", "version": "10.0"}, {"status": "affected", "version": "8.0"}, {"status": "affected", "version": "9.0"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_eus:10.0:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:8.8:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_eus:9.6:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_eus", "versions": [{"status": "affected", "version": "10.0"}, {"status": "affected", "version": "8.4"}, {"status": "affected", "version": "8.6"}, {"status": "affected", "version": "8.8"}, {"status": "affected", "version": "9.4"}, {"status": "affected", "version": "9.6"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_for_arm_64:10.0_aarch64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:8.0_aarch64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_for_arm_64", "versions": [{"status": "affected", "version": "10.0_aarch64"}, {"status": "affected", "version": "8.0_aarch64"}, {"status": "affected", "version": "9.0_aarch64"}, {"status": "affected", "version": "9.4_aarch64"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:10.0_aarch64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.6_aarch64:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_for_arm_64_eus", "versions": [{"status": "affected", "version": "10.0_aarch64"}, {"status": "affected", "version": "9.4_aarch64"}, {"status": "affected", "version": "9.6_aarch64"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:10.0_s390x:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:8.0_s390x:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_for_ibm_z_systems", "versions": [{"status": "affected", "version": "10.0_s390x"}, {"status": "affected", "version": "8.0_s390x"}, {"status": "affected", "version": "9.4_s390x"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:10.0_s390x:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.0_s390x:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.6_s390x:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_for_ibm_z_systems_eus", "versions": [{"status": "affected", "version": "10.0_s390x"}, {"status": "affected", "version": "9.0_s390x"}, {"status": "affected", "version": "9.4_s390x"}, {"status": "affected", "version": "9.6_s390x"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:10.0_ppc64le:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:8.0_ppc64le:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian:9.0_ppc64le:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_for_power_little_endian", "versions": [{"status": "affected", "version": "10.0_ppc64le"}, {"status": "affected", "version": "8.0_ppc64le"}, {"status": "affected", "version": "9.0_ppc64le"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:10.0_ppc64le:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.6_ppc64le:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_for_power_little_endian_eus", "versions": [{"status": "affected", "version": "10.0_ppc64le"}, {"status": "affected", "version": "9.4_ppc64le"}, {"status": "affected", "version": "9.6_ppc64le"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_server", "versions": [{"status": "affected", "version": "7.0"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_server_aus:8.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:8.6:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.2:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*", "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.6:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_server_aus", "versions": [{"status": "affected", "version": "8.2"}, {"status": "affected", "version": "8.4"}, {"status": "affected", "version": "8.6"}, {"status": "affected", "version": "9.2"}, {"status": "affected", "version": "9.4"}, {"status": "affected", "version": "9.6"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.4_ppc64le:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions", "versions": [{"status": "affected", "version": "9.4_ppc64le"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:enterprise_linux_server_tus:8.8:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "enterprise_linux_server_tus", "versions": [{"status": "affected", "version": "8.8"}], "defaultStatus": "unaffected"}, {"cpes": ["cpe:2.3:o:redhat:in-vehicle_operating_system:1.0:*:*:*:*:*:*:*"], "vendor": "redhat", "product": "in-vehicle_operating_system", "versions": [{"status": "affected", "version": "1.0"}], "defaultStatus": "unaffected"}], "references": [{"url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/926", "tags": ["exploit", "issue-tracking", "vendor-advisory"]}, {"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372406", "tags": ["issue-tracking"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:10630", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:10698", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:10699", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:11580", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:12098", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:12099", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:12199", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:12237", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:12239", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:12240", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:12241", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:13267", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:13289", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:13325", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:13335", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:13336", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:14059", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:14396", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:15308", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:15672", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/security/cve/CVE-2025-6021", "tags": ["third-party-advisory"]}, {"url": "https://access.redhat.com/errata/RHSA-2025:11673"}, {"url": "https://access.redhat.com/errata/RHSA-2025:19020"}, {"url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html"}], "descriptions": [{"lang": "en", "value": "A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input."}, {"lang": "es", "value": "Se detectó una falla en la función xmlBuildQName de libxml2. Los desbordamientos de enteros en los cálculos del tamaño del búfer pueden provocar un desbordamiento del búfer en la pila. Este problema puede provocar corrupción de memoria o una denegación de servicio al procesar entradas manipuladas."}], "problemTypes": [{"descriptions": [{"lang": "en", "cweId": "CWE-787", "description": "CWE-787"}]}], "providerMetadata": {"orgId": "00000000-0000-4000-A000-000000000003", "shortName": "nvd", "dateUpdated": "2025-06-12T13:15:25Z", "x_subShortName": "nvd"}}}, "cveMetadata": {"cveId": "CVE-2025-6021", "state": "PUBLISHED", "dateUpdated": "2026-03-24T12:16:12Z", "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "datePublished": "2025-06-12T13:15:25Z", "assignerShortName": "redhat"}, "dataVersion": "5.0"}