Stack-based Buffer Overflow Affecting libxml2 package, versions <2.9.10+dfsg-5ubuntu0.20.04.10+esm1


Severity

Recommended
medium

Based on Ubuntu security rating.

Threat Intelligence

EPSS
0.02% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UBUNTU2004-LIBXML2-10379130
  • published21 Aug 2025
  • disclosed16 Jun 2025

Introduced: 16 Jun 2025

CVE-2025-6170  (opens in a new tab)
CWE-121  (opens in a new tab)

How to fix?

Upgrade Ubuntu:20.04 libxml2 to version 2.9.10+dfsg-5ubuntu0.20.04.10+esm1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream libxml2 package and not the libxml2 package as distributed by Ubuntu. See How to fix? for Ubuntu:20.04 relevant fixed versions and status.

A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.

CVSS Base Scores

version 3.1