A flaw was identified in the interactive shell of the...
Moderate severity
Unreviewed
Published
Feb 2, 2026
to the GitHub Advisory Database
•
Updated Mar 12, 2026
Description
Published by the National Vulnerability Database
Feb 2, 2026
Published to the GitHub Advisory Database
Feb 2, 2026
Last updated
Mar 12, 2026
A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.
References