CVE-2025-6170

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
References
Link Resource
https://access.redhat.com/security/cve/CVE-2025-6170 Third Party Advisory Mitigation
https://bugzilla.redhat.com/show_bug.cgi?id=2372952 Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:*

History

12 Aug 2025, 13:04

Type Values Removed Values Added
References () https://access.redhat.com/security/cve/CVE-2025-6170 - () https://access.redhat.com/security/cve/CVE-2025-6170 - Third Party Advisory, Mitigation
References () https://bugzilla.redhat.com/show_bug.cgi?id=2372952 - () https://bugzilla.redhat.com/show_bug.cgi?id=2372952 - Issue Tracking, Third Party Advisory
First Time Redhat
Redhat enterprise Linux
Redhat openshift Container Platform
Xmlsoft
Xmlsoft libxml2
Redhat jboss Core Services
CPE cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:*

17 Jun 2025, 20:50

Type Values Removed Values Added
Summary
  • (es) Se detectó una falla en el shell interactivo de la herramienta de línea de comandos xmllint, utilizada para analizar archivos XML. Cuando un usuario introduce un comando demasiado largo, el programa no verifica correctamente el tamaño de entrada, lo que puede provocar un bloqueo. Este problema podría permitir a los atacantes ejecutar código dañino en configuraciones poco comunes sin protecciones modernas.

16 Jun 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-16 16:15

Updated : 2025-08-12 13:04


NVD link : CVE-2025-6170

Mitre link : CVE-2025-6170

CVE.ORG link : CVE-2025-6170


JSON object : View

Products Affected

xmlsoft

  • libxml2

redhat

  • enterprise_linux
  • jboss_core_services
  • openshift_container_platform
CWE
CWE-121

Stack-based Buffer Overflow