A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Jun 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 16 Jun 2025 15:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections. |
Title | libxml2: Stack Buffer Overflow in xmllint Interactive Shell Command Handling | Libxml2: stack buffer overflow in xmllint interactive shell command handling |
First Time appeared |
Redhat
Redhat enterprise Linux Redhat jboss Core Services Redhat openshift |
|
CPEs | cpe:/a:redhat:jboss_core_services:1 cpe:/a:redhat:openshift:4 cpe:/o:redhat:enterprise_linux:10 cpe:/o:redhat:enterprise_linux:6 cpe:/o:redhat:enterprise_linux:7 cpe:/o:redhat:enterprise_linux:8 cpe:/o:redhat:enterprise_linux:9 |
|
Vendors & Products |
Redhat
Redhat enterprise Linux Redhat jboss Core Services Redhat openshift |
|
References |
|
Mon, 16 Jun 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | No description is available for this CVE. | |
Title | libxml2: Stack Buffer Overflow in xmllint Interactive Shell Command Handling | |
Weaknesses | CWE-121 | |
References |
| |
Metrics |
threat_severity
|
cvssV3_1
|

Status: PUBLISHED
Assigner: redhat
Published: 2025-06-16T15:24:05.410Z
Updated: 2025-06-16T16:05:15.543Z
Reserved: 2025-06-16T05:59:31.739Z
Link: CVE-2025-6170

Updated: 2025-06-16T16:05:11.783Z

Status : Received
Published: 2025-06-16T16:15:20.430
Modified: 2025-06-16T16:15:20.430
Link: CVE-2025-6170
