Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2026:0570-1

Опубликовано: 17 фев. 2026
Источник: suse-cvrf

Описание

Security update for libxml2

This update for libxml2 fixes the following issues:

  • CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in xmlCatalogXMLResolveURI. (bsc#1256807, bsc#1256811)
  • CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
  • CVE-2026-1757: Fixed a memory leak in the xmllint interactive shell. (bsc#1257594, bsc#1257595)
  • CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553)
  • CVE-2025-8732: Fixed an infinite recursion in catalog parsing functions when processing malformed SGML catalog files. (bsc#1247858)

Список пакетов

Container suse/sle-micro/base-5.5:latest
libxml2-2-2.10.3-150500.5.38.1
Container suse/sle-micro/kvm-5.5:latest
libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5
libxml2-2-2.10.3-150500.5.38.1
libxml2-tools-2.10.3-150500.5.38.1
python3-libxml2-2.10.3-150500.5.38.1
openSUSE Leap 15.6
libxml2-2-2.10.3-150500.5.38.1
libxml2-2-32bit-2.10.3-150500.5.38.1
libxml2-devel-2.10.3-150500.5.38.1
libxml2-devel-32bit-2.10.3-150500.5.38.1
libxml2-doc-2.10.3-150500.5.38.1
libxml2-tools-2.10.3-150500.5.38.1
python3-libxml2-2.10.3-150500.5.38.1
python311-libxml2-2.10.3-150500.5.38.1

Описание

A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.


Затронутые продукты
Container suse/sle-micro/base-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
Container suse/sle-micro/kvm-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-tools-2.10.3-150500.5.38.1

Ссылки

Описание

A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."


Затронутые продукты
Container suse/sle-micro/base-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
Container suse/sle-micro/kvm-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-tools-2.10.3-150500.5.38.1

Ссылки

Описание

A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.


Затронутые продукты
Container suse/sle-micro/base-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
Container suse/sle-micro/kvm-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-tools-2.10.3-150500.5.38.1

Ссылки

Описание

A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.


Затронутые продукты
Container suse/sle-micro/base-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
Container suse/sle-micro/kvm-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-tools-2.10.3-150500.5.38.1

Ссылки

Описание

A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.


Затронутые продукты
Container suse/sle-micro/base-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
Container suse/sle-micro/kvm-5.5:latest:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-2-2.10.3-150500.5.38.1
SUSE Linux Enterprise Micro 5.5:libxml2-tools-2.10.3-150500.5.38.1

Ссылки
Уязвимость SUSE-SU-2026:0570-1