CVE-2026-1757

NameCVE-2026-1757
DescriptionA flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
libxml2 (PTS)bullseye2.9.10+dfsg-6.7+deb11u4vulnerable
bullseye (security)2.9.10+dfsg-6.7+deb11u9vulnerable
bookworm2.9.14+dfsg-1.3~deb12u5vulnerable
bookworm (security)2.9.14+dfsg-1.3~deb12u4vulnerable
trixie2.12.7+dfsg+really2.9.14-2.1+deb13u2vulnerable
trixie (security)2.12.7+dfsg+really2.9.14-2.1+deb13u1vulnerable
forky, sid2.15.1+dfsg-2vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
libxml2source(unstable)(unfixed)unimportant

Notes

https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43ba37dfb07ebe6446fbad9d0973d9279d
Negligible security impact, memory leak in xmllint CLI utility

Search for package or bug name: Reporting problems