CVE-2026-1757

Published: February 3, 2026Last modified: February 11, 2026

Description

A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.

Severity score breakdown

ParameterValue
Base score6.2
Attack VectorLOCAL
Attack complexityLOW
Privileges requiredNONE
User interactionNONE
ScopeUNCHANGED
ConfidentialityNONE
Integrity impactNONE
Availability impactHIGH
VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Status

ProductReleasePackageStatus
Alpaquita Linux23 LTSlibxml2Fixed (2.10.4-r8)
25 LTSlibxml2Fixed (2.13.9-r2)
Streamlibxml2Fixed (2.13.9-r2)
Hardened Containers23 LTSlibxml2Fixed (2.10.4-r8)
25 LTSlibxml2Fixed (2.13.9-r2)
Streamlibxml2Fixed (2.13.9-r2)

References

ON THIS PAGE