CVE-2026-5037

NameCVE-2026-5037
DescriptionA vulnerability was determined in mxml up to 4.0.4. This issue affects the function index_sort of the file mxml-index.c of the component mxmlIndexNew. Executing a manipulation of the argument tempr can lead to stack-based buffer overflow. The attack is restricted to local execution. The exploit has been publicly disclosed and may be utilized. This patch is called 6e27354466092a1ac65601e01ce6708710bb9fa5. A patch should be applied to remediate this issue.
SourceCVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
Debian Bugs1132328

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
mxml (PTS)bullseye3.2-1vulnerable
bookworm, trixie3.3.1-1vulnerable
forky, sid4.0.4-4fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
mxmlsource(unstable)4.0.4-41132328

Notes

[trixie] - mxml <no-dsa> (Minor issue)
[bookworm] - mxml <no-dsa> (Minor issue)
[bullseye] - mxml <postponed> (Minor issue)
https://github.com/michaelrsweet/mxml/issues/350
Fixed by: https://github.com/michaelrsweet/mxml/commit/6e27354466092a1ac65601e01ce6708710bb9fa5

Search for package or bug name: Reporting problems