SB2026022043 - SUSE update for libxml2



SB2026022043 - SUSE update for libxml2

Published: February 20, 2026

Security Bulletin ID SB2026022043
Severity
Medium
Patch available
YES
Number of vulnerabilities 4
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 75% Low 25%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2025-10911)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a use-after-free error when parsing xsl nodes. A remote attacker can pass a specially crafted XML file to the application and crash it.


2) Uncontrolled Recursion (CVE-ID: CVE-2026-0990)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to an uncontrolled recursion in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker can pass specially crafted input to the application and perform a denial of service attack.


3) Resource exhaustion (CVE-ID: CVE-2026-0992)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to application does not properly control consumption of internal resources when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can trigger resource exhaustion and perform a denial of service (DoS) attack.


4) Memory leak (CVE-ID: CVE-2026-1757)

The vulnerability allows a remote attacker to perform DoS attack on the target system.

The vulnerability exists due memory leak within the interactive shell of the xmllint utility when handling whitespaces. A remote attacker can force the application to leak memory and perform denial of service attack.


Remediation

Install update from vendor's website.