A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
References
Link | Resource |
---|---|
https://access.redhat.com/security/cve/CVE-2025-6170 | Third Party Advisory Mitigation |
https://bugzilla.redhat.com/show_bug.cgi?id=2372952 | Issue Tracking Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
12 Aug 2025, 13:04
Type | Values Removed | Values Added |
---|---|---|
First Time |
Xmlsoft
Redhat enterprise Linux Redhat jboss Core Services Xmlsoft libxml2 Redhat Redhat openshift Container Platform |
|
References | () https://access.redhat.com/security/cve/CVE-2025-6170 - Third Party Advisory, Mitigation | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=2372952 - Issue Tracking, Third Party Advisory | |
CPE | cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:6.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:* cpe:2.3:a:redhat:jboss_core_services:-:*:*:*:*:*:*:* cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:* cpe:2.3:o:redhat:enterprise_linux:10.0:*:*:*:*:*:*:* cpe:2.3:a:xmlsoft:libxml2:-:*:*:*:*:*:*:* |
17 Jun 2025, 20:50
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
16 Jun 2025, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-16 16:15
Updated : 2025-08-12 13:04
NVD link : CVE-2025-6170
Mitre link : CVE-2025-6170
CVE.ORG link : CVE-2025-6170
JSON object : View
Products Affected
redhat
- enterprise_linux
- openshift_container_platform
- jboss_core_services
xmlsoft
- libxml2
CWE
CWE-121
Stack-based Buffer Overflow