Security update for libxml2, libxslt
| Announcement ID: | SUSE-SU-2026:20647-1 |
|---|---|
| Release Date: | 2026-03-04T10:48:20Z |
| Rating: | moderate |
| References: | |
| Cross-References: | |
| CVSS scores: |
|
| Affected Products: |
|
An update that solves five vulnerabilities and has eight fixes can now be installed.
Description:
This update for libxml2, libxslt fixes the following issues:
Changes in libxml2:
- CVE-2026-0990: call stack overflow may lead to application crash due to infinite recursion in
xmlCatalogXMLResolveURI(bsc#1256807, bsc#1256811). - CVE-2026-0992: excessive resource consumption when processing XML catalogs due to exponential behavior when handling
nextCatalogelements (bsc#1256809, bsc#1256812). - CVE-2025-8732: infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247858).
- CVE-2026-1757: memory leak in the
xmllintinteractive shell (bsc#1257594, bsc#1257595). - CVE-2025-10911: parsing xsl nodes may lead to use-after-free with key data stored cross-RVT (bsc#1250553)
Patch Instructions:
To install this SUSE update use the SUSE recommended
installation methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:
-
SUSE Linux Micro 6.2
zypper in -t patch SUSE-SL-Micro-6.2-353=1
Package List:
-
SUSE Linux Micro 6.2 (aarch64 ppc64le s390x x86_64)
- libxml2-tools-debuginfo-2.13.8-160000.4.1
- libxslt1-1.1.43-160000.4.1
- python313-libxml2-debuginfo-2.13.8-160000.4.1
- libxml2-python-debugsource-2.13.8-160000.4.1
- libxslt1-debuginfo-1.1.43-160000.4.1
- libexslt0-debuginfo-1.1.43-160000.4.1
- python313-libxml2-2.13.8-160000.4.1
- libxml2-2-debuginfo-2.13.8-160000.4.1
- libxslt-debugsource-1.1.43-160000.4.1
- libexslt0-1.1.43-160000.4.1
- libxml2-debugsource-2.13.8-160000.4.1
- libxml2-2-2.13.8-160000.4.1
- libxml2-tools-2.13.8-160000.4.1
References:
- https://www.suse.com/security/cve/CVE-2025-10911.html
- https://www.suse.com/security/cve/CVE-2025-8732.html
- https://www.suse.com/security/cve/CVE-2026-0990.html
- https://www.suse.com/security/cve/CVE-2026-0992.html
- https://www.suse.com/security/cve/CVE-2026-1757.html
- https://bugzilla.suse.com/show_bug.cgi?id=1247850
- https://bugzilla.suse.com/show_bug.cgi?id=1247858
- https://bugzilla.suse.com/show_bug.cgi?id=1250553
- https://bugzilla.suse.com/show_bug.cgi?id=1256804
- https://bugzilla.suse.com/show_bug.cgi?id=1256807
- https://bugzilla.suse.com/show_bug.cgi?id=1256808
- https://bugzilla.suse.com/show_bug.cgi?id=1256809
- https://bugzilla.suse.com/show_bug.cgi?id=1256810
- https://bugzilla.suse.com/show_bug.cgi?id=1256811
- https://bugzilla.suse.com/show_bug.cgi?id=1256812
- https://bugzilla.suse.com/show_bug.cgi?id=1257593
- https://bugzilla.suse.com/show_bug.cgi?id=1257594
- https://bugzilla.suse.com/show_bug.cgi?id=1257595