Home

Description

A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.

PUBLISHED Reserved 2026-02-02 | Published 2026-02-02 | Updated 2026-02-17 | Assigner redhat




MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

Missing Release of Memory after Effective Lifetime

Product status

Default status
affected

Default status
unknown

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Default status
affected

Timeline

2026-02-02:Reported to Red Hat.
2026-02-02:Made public.

Credits

Red Hat would like to thank lanbigking for reporting this issue.

References

access.redhat.com/security/cve/CVE-2026-1757 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2435940 (RHBZ#2435940) issue-tracking

cve.org (CVE-2026-1757)

nvd.nist.gov (CVE-2026-1757)

Download JSON