A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2025-6170 | Third Party Advisory Mitigation |
https://bugzilla.redhat.com/show_bug.cgi?id=2372952 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
12 Aug 2025, 13:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://access.redhat.com/security/cve/CVE-2025-6170 - Third Party Advisory, Mitigation | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2372952 - Issue Tracking, Third Party Advisory | |
First Time |
Redhat
Redhat enterprise Linux Redhat openshift Container Platform Xmlsoft Xmlsoft libxml2 Redhat jboss Core Services |
|
CPE | cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:* |
17 Jun 2025, 20:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-16 16:15
Updated : 2025-08-12 13:04
NVD link : CVE-2025-6170
Mitre link : CVE-2025-6170
CVE.ORG link : CVE-2025-6170
JSON object : View
Products Affected
xmlsoft
- libxml2
redhat
- enterprise_linux
- jboss_core_services
- openshift_container_platform
CWE
CWE-121
Stack-based Buffer Overflow