Security update for libxslt, libxml2
| Announcement ID: | SUSE-SU-2026:20707-1 |
|---|---|
| Release Date: | 2026-03-06T11:58:49Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves six vulnerabilities and has eight fixes can now be installed.
Description:
This update for libxslt, libxml2 fixes the following issues:
Changes in libxml2:
- CVE-2026-0990: call stack overflow may lead to application crash due to infinite recursion in
xmlCatalogXMLResolveURI(bsc#1256807, bsc#1256811). - CVE-2026-0992: excessive resource consumption when processing XML catalogs due to exponential behavior when handling
nextCatalogelements (bsc#1256809, bsc#1256812). - CVE-2025-8732: infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247858).
- CVE-2026-1757: memory leak in the
xmllintinteractive shell (bsc#1257594, bsc#1257595). - CVE-2025-10911: parsing xsl nodes may lead to use-after-free with key data stored cross-RVT (bsc#1250553).
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.0
zypper in -t patch SUSE-SLE-Micro-6.0-608=1
Package List:
-
SUSE Linux Micro 6.0 (aarch64 s390x x86_64)
- libxml2-debugsource-2.11.6-12.1
- libexslt0-debuginfo-1.1.38-8.1
- python311-libxml2-debuginfo-2.11.6-12.1
- libxslt1-1.1.38-8.1
- libxml2-python-debugsource-2.11.6-12.1
- libexslt0-1.1.38-8.1
- libxml2-2-2.11.6-12.1
- libxslt-debugsource-1.1.38-8.1
- libxml2-tools-debuginfo-2.11.6-12.1
- libxslt1-debuginfo-1.1.38-8.1
- libxml2-2-debuginfo-2.11.6-12.1
- python311-libxml2-2.11.6-12.1
- libxml2-tools-2.11.6-12.1
References:
- https://www.suse.com/security/cve/CVE-2025-10911.html
- https://www.suse.com/security/cve/CVE-2025-8732.html
- https://www.suse.com/security/cve/CVE-2026-0989.html
- https://www.suse.com/security/cve/CVE-2026-0990.html
- https://www.suse.com/security/cve/CVE-2026-0992.html
- https://www.suse.com/security/cve/CVE-2026-1757.html
- https://bugzilla.suse.com/show_bug.cgi?id=1247850
- https://bugzilla.suse.com/show_bug.cgi?id=1247858
- https://bugzilla.suse.com/show_bug.cgi?id=1250553
- https://bugzilla.suse.com/show_bug.cgi?id=1256804
- https://bugzilla.suse.com/show_bug.cgi?id=1256805
- https://bugzilla.suse.com/show_bug.cgi?id=1256807
- https://bugzilla.suse.com/show_bug.cgi?id=1256808
- https://bugzilla.suse.com/show_bug.cgi?id=1256809
- https://bugzilla.suse.com/show_bug.cgi?id=1256810
- https://bugzilla.suse.com/show_bug.cgi?id=1256811
- https://bugzilla.suse.com/show_bug.cgi?id=1256812
- https://bugzilla.suse.com/show_bug.cgi?id=1257593
- https://bugzilla.suse.com/show_bug.cgi?id=1257594
- https://bugzilla.suse.com/show_bug.cgi?id=1257595