Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-1757— Libxml2: memory leak leading to local denial of service in xmllint interactive shell

CVSS 6.2 · Medium EPSS 0.01% · P1
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-1757

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Libxml2: memory leak leading to local denial of service in xmllint interactive shell
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在移除最后引用时对内存的释放不恰当(内存泄露)
Source: NVD (National Vulnerability Database)
Vulnerability Title
libxml2 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
libxml2是GNOME开源的一个用来解析XML文档的函数库。它用C语言写成,并且能为多种语言所调用,例如C语言,C++,XSH。 libxml2存在安全漏洞,该漏洞源于交互式shell中内存释放不当,可能导致本地拒绝服务攻击。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Hardened Images 2.15.2-0.3.hum1 ~ * cpe:/a:redhat:hummingbird:1
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat JBoss Core Services-cpe:/a:redhat:jboss_core_services:1
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4

II. Public POCs for CVE-2026-1757

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-1757

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2026-02-02 · 7 CVEs total

CVE-2026-17618.6 HIGHLibsoup: stack-based buffer overflow in libsoup multipart response parsingmultipart http r
CVE-2026-15318.1 HIGHForeman-kubevirt: foreman_kubevirt: man-in-the-middle due to insecure default ssl verifica
CVE-2026-15308.1 HIGHFog-kubevirt: fog-kubevirt: man-in-the-middle vulnerability due to disabled certificate va
CVE-2026-17605.3 MEDIUMLibsoup: soupserver: denial of service via http request smuggling
CVE-2026-15182.7 LOWKeycloak: blind server-side request forgery (ssrf) via ciba backchannel notification endpo
CVE-2025-138812.7 LOWOrg.keycloak.services.resources.admin: keycloak: limited administrator can retrieve sensit

IV. Related Vulnerabilities

V. Comments for CVE-2026-1757

No comments yet


Leave a comment