CVE-2025-6170 log
| Source |
|
| Severity | Low |
| Remote | Yes |
| Type | Denial of service |
| Description | A stack-based buffer overflow vulnerability exists in the command-parsing logic of the interactive shell in xmllint. An attacker can supply an overly long argument to any shell command, triggering an unbounded memory copy that overflows a fixed-size buffer on the stack. This leads to a reliable Denial of Service and could be leveraged for Arbitrary Code Execution on systems without exploit mitigations. |
| Group | Package | Affected | Fixed | Severity | Status | Ticket |
|---|---|---|---|---|---|---|
| AVG-2898 | libxml2 | 2.14.4-1 | High | Vulnerable |
| References |
|---|
https://gitlab.gnome.org/GNOME/libxml2/-/issues/941 |