A flaw was found in libxml2's xmlBuildQName function,...
High severity
Unreviewed
Published
Jun 12, 2025
to the GitHub Advisory Database
•
Updated Sep 3, 2025
Description
Published by the National Vulnerability Database
Jun 12, 2025
Published to the GitHub Advisory Database
Jun 12, 2025
Last updated
Sep 3, 2025
A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.
References