| Name | CVE-2026-1757 |
| Description | A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| libxml2 (PTS) | bullseye | 2.9.10+dfsg-6.7+deb11u4 | vulnerable |
| bullseye (security) | 2.9.10+dfsg-6.7+deb11u9 | vulnerable | |
| bookworm | 2.9.14+dfsg-1.3~deb12u5 | vulnerable | |
| bookworm (security) | 2.9.14+dfsg-1.3~deb12u4 | vulnerable | |
| trixie | 2.12.7+dfsg+really2.9.14-2.1+deb13u2 | vulnerable | |
| trixie (security) | 2.12.7+dfsg+really2.9.14-2.1+deb13u1 | vulnerable | |
| forky, sid | 2.15.2+dfsg-0.1 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| libxml2 | source | (unstable) | 2.15.2+dfsg-0.1 | unimportant |
https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/160c8a43ba37dfb07ebe6446fbad9d0973d9279d
Fixed by: https://gitlab.gnome.org/GNOME/libxml2/-/commit/5446460ad3229579c91506317fb80ab333d44414 (v2.15.2)
Negligible security impact, memory leak in xmllint CLI utility