<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libxml2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2026:0568-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2026-02-17T12:26:27Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2026-02-17T12:26:27Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-02-17T12:26:27Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libxml2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libxml2 fixes the following issues:

- CVE-2026-0990: Fixed a call stack overflow leading to application crash due to infinite recursion in `xmlCatalogXMLResolveURI`. (bsc#1256807, bsc#1256811)
- CVE-2026-0992: Fixed an excessive resource consumption when processing XML catalogs due to exponential behavior. (bsc#1256809, bsc#1256812)
- CVE-2026-1757: Fixed a memory leak in the `xmllint` interactive shell. (bsc#1257594, bsc#1257595)
- CVE-2025-10911: Fixed a use-after-free with key data stored cross-RVT. (bsc#1250553)
  </Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/sle-micro-rancher/5.2:latest-2026-568,SUSE-2026-568,SUSE-SUSE-MicroOS-5.2-2026-568,openSUSE-SLE-15.6-2026-568</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260568-1/</URL>
      <Description>Link for SUSE-SU-2026:0568-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2026-February/024333.html</URL>
      <Description>E-Mail link for SUSE-SU-2026:0568-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1250553</URL>
      <Description>SUSE Bug 1250553</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256807</URL>
      <Description>SUSE Bug 1256807</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256808</URL>
      <Description>SUSE Bug 1256808</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256809</URL>
      <Description>SUSE Bug 1256809</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256811</URL>
      <Description>SUSE Bug 1256811</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1256812</URL>
      <Description>SUSE Bug 1256812</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257593</URL>
      <Description>SUSE Bug 1257593</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257594</URL>
      <Description>SUSE Bug 1257594</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1257595</URL>
      <Description>SUSE Bug 1257595</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-10911/</URL>
      <Description>SUSE CVE CVE-2025-10911 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-0990/</URL>
      <Description>SUSE CVE CVE-2026-0990 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-0992/</URL>
      <Description>SUSE CVE CVE-2026-0992 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2026-1757/</URL>
      <Description>SUSE CVE CVE-2026-1757 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/sle-micro-rancher/5.2:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro-rancher/5.2:latest">
        <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest">Container suse/sle-micro-rancher/5.2:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.2">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.2">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2" CPE="cpe:/o:suse:suse-microos:5.2">SUSE Linux Enterprise Micro 5.2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Leap 15.6">
      <Branch Type="Product Name" Name="openSUSE Leap 15.6">
        <FullProductName ProductID="openSUSE Leap 15.6" CPE="cpe:/o:opensuse:leap:15.6">openSUSE Leap 15.6</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-2-2.9.7-150000.3.94.1">libxml2-2-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-32bit-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-2-32bit-2.9.7-150000.3.94.1">libxml2-2-32bit-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-64bit-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-2-64bit-2.9.7-150000.3.94.1">libxml2-2-64bit-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-devel-2.9.7-150000.3.94.1">libxml2-devel-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-32bit-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-devel-32bit-2.9.7-150000.3.94.1">libxml2-devel-32bit-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-64bit-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-devel-64bit-2.9.7-150000.3.94.1">libxml2-devel-64bit-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-doc-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-doc-2.9.7-150000.3.94.1">libxml2-doc-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-tools-2.9.7-150000.3.94.1">
      <FullProductName ProductID="libxml2-tools-2.9.7-150000.3.94.1">libxml2-tools-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python2-libxml2-python-2.9.7-150000.3.94.1">
      <FullProductName ProductID="python2-libxml2-python-2.9.7-150000.3.94.1">python2-libxml2-python-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python3-libxml2-python-2.9.7-150000.3.94.1">
      <FullProductName ProductID="python3-libxml2-python-2.9.7-150000.3.94.1">python3-libxml2-python-2.9.7-150000.3.94.1</FullProductName>
    </Branch>
    <Relationship ProductReference="libxml2-2-2.9.7-150000.3.94.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.2:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.2:latest:libxml2-2-2.9.7-150000.3.94.1">libxml2-2-2.9.7-150000.3.94.1 as a component of Container suse/sle-micro-rancher/5.2:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.7-150000.3.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:libxml2-2-2.9.7-150000.3.94.1">libxml2-2-2.9.7-150000.3.94.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-tools-2.9.7-150000.3.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:libxml2-tools-2.9.7-150000.3.94.1">libxml2-tools-2.9.7-150000.3.94.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-libxml2-python-2.9.7-150000.3.94.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.2">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.2:python3-libxml2-python-2.9.7-150000.3.94.1">python3-libxml2-python-2.9.7-150000.3.94.1 as a component of SUSE Linux Enterprise Micro 5.2</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-libxml2-python-2.9.7-150000.3.94.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Leap 15.6">
      <FullProductName ProductID="openSUSE Leap 15.6:python3-libxml2-python-2.9.7-150000.3.94.1">python3-libxml2-python-2.9.7-150000.3.94.1 as a component of openSUSE Leap 15.6</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.</Note>
    </Notes>
    <CVE>CVE-2025-10911</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-tools-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
        <ProductID>openSUSE Leap 15.6:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260568-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-10911.html</URL>
        <Description>CVE-2025-10911</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1250553</URL>
        <Description>SUSE Bug 1250553</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.</Note>
    </Notes>
    <CVE>CVE-2026-0990</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-tools-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
        <ProductID>openSUSE Leap 15.6:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260568-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-0990.html</URL>
        <Description>CVE-2026-0990</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256806</URL>
        <Description>SUSE Bug 1256806</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated &lt;nextCatalog&gt; elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.</Note>
    </Notes>
    <CVE>CVE-2026-0992</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-tools-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
        <ProductID>openSUSE Leap 15.6:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260568-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-0992.html</URL>
        <Description>CVE-2026-0992</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1256808</URL>
        <Description>SUSE Bug 1256808</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.</Note>
    </Notes>
    <CVE>CVE-2026-1757</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/sle-micro-rancher/5.2:latest:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-2-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:libxml2-tools-2.9.7-150000.3.94.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.2:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
        <ProductID>openSUSE Leap 15.6:python3-libxml2-python-2.9.7-150000.3.94.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2026/suse-su-20260568-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2026-1757.html</URL>
        <Description>CVE-2026-1757</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1257593</URL>
        <Description>SUSE Bug 1257593</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
