Name | CVE-2025-6170 |
Description | A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Debian Bugs | 1107938 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libxml2 (PTS) | bullseye | 2.9.10+dfsg-6.7+deb11u4 | vulnerable |
| bullseye (security) | 2.9.10+dfsg-6.7+deb11u7 | vulnerable |
| bookworm | 2.9.14+dfsg-1.3~deb12u1 | vulnerable |
| bookworm (security) | 2.9.14+dfsg-1.3~deb12u2 | vulnerable |
| trixie, sid | 2.12.7+dfsg+really2.9.14-1 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libxml2 | source | (unstable) | (unfixed) | unimportant | | 1107938 |
Notes
https://gitlab.gnome.org/GNOME/libxml2/-/issues/941
Crash in CLI tool, no security impact
Fixed by https://gitlab.gnome.org/GNOME/libxml2/-/commit/c340e419505cf4bf1d9ed7019a87cc00ec200434 (2.14)