{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-06T14:46:18.551","vulnerabilities":[{"cve":{"id":"CVE-2026-1757","sourceIdentifier":"secalert@redhat.com","published":"2026-02-02T13:15:58.580","lastModified":"2026-04-22T10:16:50.683","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system."},{"lang":"es","value":"Se identificó una falla en la shell interactiva de la utilidad xmllint, parte del proyecto libxml2, donde la memoria asignada para la entrada del usuario no se libera correctamente bajo ciertas condiciones. Cuando un usuario envía una entrada que consiste únicamente en espacios en blanco, el programa omite la ejecución del comando pero no libera el búfer asignado. Repetir esta acción provoca que la memoria se acumule continuamente. Con el tiempo, esto puede agotar la memoria del sistema y terminar el proceso xmllint, creando una condición de denegación de servicio en el sistema local."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":6.2,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":3.6}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-401"}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2026:7519","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2026-1757","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2435940","source":"secalert@redhat.com"},{"url":"https://gitlab.gnome.org/GNOME/libxml2/-/issues/1009","source":"secalert@redhat.com"}]}}]}