<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">Security update for libxml2</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE-SU-2025:4116-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-11-17T07:26:16Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-11-17T07:26:16Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-11-17T07:26:16Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">Security update for libxml2</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">This update for libxml2 fixes the following issues:

- CVE-2025-9714: Fixed inifinite recursion at exsltDynMapFunction function in libexslt/dynamic.c (bsc#1249076)
- CVE-2025-8732: Fixed infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247850)
</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">Container suse/manager/4.3/proxy-httpd:latest-2025-4116,Container suse/sle-micro-rancher/5.3:latest-2025-4116,Container suse/sle-micro-rancher/5.4:latest-2025-4116,Container suse/sle-micro/5.3/toolbox:latest-2025-4116,Container suse/sle-micro/5.4/toolbox:latest-2025-4116,SUSE-2025-4116,SUSE-SLE-Micro-5.3-2025-4116,SUSE-SLE-Micro-5.4-2025-4116</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254116-1/</URL>
      <Description>Link for SUSE-SU-2025:4116-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://lists.suse.com/pipermail/sle-security-updates/2025-November/023291.html</URL>
      <Description>E-Mail link for SUSE-SU-2025:4116-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1247850</URL>
      <Description>SUSE Bug 1247850</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://bugzilla.suse.com/1249076</URL>
      <Description>SUSE Bug 1249076</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-8732/</URL>
      <Description>SUSE CVE CVE-2025-8732 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-9714/</URL>
      <Description>SUSE CVE CVE-2025-9714 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="Container suse/manager/4.3/proxy-httpd:latest">
      <Branch Type="Product Name" Name="Container suse/manager/4.3/proxy-httpd:latest">
        <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest">Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro-rancher/5.3:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro-rancher/5.3:latest">
        <FullProductName ProductID="Container suse/sle-micro-rancher/5.3:latest">Container suse/sle-micro-rancher/5.3:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro-rancher/5.4:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro-rancher/5.4:latest">
        <FullProductName ProductID="Container suse/sle-micro-rancher/5.4:latest">Container suse/sle-micro-rancher/5.4:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro/5.3/toolbox:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/5.3/toolbox:latest">
        <FullProductName ProductID="Container suse/sle-micro/5.3/toolbox:latest">Container suse/sle-micro/5.3/toolbox:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Container suse/sle-micro/5.4/toolbox:latest">
      <Branch Type="Product Name" Name="Container suse/sle-micro/5.4/toolbox:latest">
        <FullProductName ProductID="Container suse/sle-micro/5.4/toolbox:latest">Container suse/sle-micro/5.4/toolbox:latest</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.3">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.3">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3" CPE="cpe:/o:suse:sle-micro:5.3">SUSE Linux Enterprise Micro 5.3</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Micro 5.4">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Micro 5.4">
        <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4" CPE="cpe:/o:suse:sle-micro:5.4">SUSE Linux Enterprise Micro 5.4</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="python3-libxml2-2.9.14-150400.5.50.1">
      <FullProductName ProductID="python3-libxml2-2.9.14-150400.5.50.1">python3-libxml2-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-2-2.9.14-150400.5.50.1">libxml2-2-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-32bit-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-2-32bit-2.9.14-150400.5.50.1">libxml2-2-32bit-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-2-64bit-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-2-64bit-2.9.14-150400.5.50.1">libxml2-2-64bit-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-devel-2.9.14-150400.5.50.1">libxml2-devel-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-32bit-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-devel-32bit-2.9.14-150400.5.50.1">libxml2-devel-32bit-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-devel-64bit-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-devel-64bit-2.9.14-150400.5.50.1">libxml2-devel-64bit-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-doc-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-doc-2.9.14-150400.5.50.1">libxml2-doc-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="libxml2-tools-2.9.14-150400.5.50.1">
      <FullProductName ProductID="libxml2-tools-2.9.14-150400.5.50.1">libxml2-tools-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="python311-libxml2-2.9.14-150400.5.50.1">
      <FullProductName ProductID="python311-libxml2-2.9.14-150400.5.50.1">python311-libxml2-2.9.14-150400.5.50.1</FullProductName>
    </Branch>
    <Relationship ProductReference="python3-libxml2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/manager/4.3/proxy-httpd:latest">
      <FullProductName ProductID="Container suse/manager/4.3/proxy-httpd:latest:python3-libxml2-2.9.14-150400.5.50.1">python3-libxml2-2.9.14-150400.5.50.1 as a component of Container suse/manager/4.3/proxy-httpd:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.3:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.3:latest:libxml2-2-2.9.14-150400.5.50.1">libxml2-2-2.9.14-150400.5.50.1 as a component of Container suse/sle-micro-rancher/5.3:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro-rancher/5.4:latest">
      <FullProductName ProductID="Container suse/sle-micro-rancher/5.4:latest:libxml2-2-2.9.14-150400.5.50.1">libxml2-2-2.9.14-150400.5.50.1 as a component of Container suse/sle-micro-rancher/5.4:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.3/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.3/toolbox:latest:libxml2-2-2.9.14-150400.5.50.1">libxml2-2-2.9.14-150400.5.50.1 as a component of Container suse/sle-micro/5.3/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="Container suse/sle-micro/5.4/toolbox:latest">
      <FullProductName ProductID="Container suse/sle-micro/5.4/toolbox:latest:libxml2-2-2.9.14-150400.5.50.1">libxml2-2-2.9.14-150400.5.50.1 as a component of Container suse/sle-micro/5.4/toolbox:latest</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.50.1">libxml2-2-2.9.14-150400.5.50.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-tools-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.50.1">libxml2-tools-2.9.14-150400.5.50.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-libxml2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.3">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.50.1">python3-libxml2-2.9.14-150400.5.50.1 as a component of SUSE Linux Enterprise Micro 5.3</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.50.1">libxml2-2-2.9.14-150400.5.50.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="libxml2-tools-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.50.1">libxml2-tools-2.9.14-150400.5.50.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
    <Relationship ProductReference="python3-libxml2-2.9.14-150400.5.50.1" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Micro 5.4">
      <FullProductName ProductID="SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.50.1">python3-libxml2-2.9.14-150400.5.50.1 as a component of SUSE Linux Enterprise Micro 5.4</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that "[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all."</Note>
    </Notes>
    <CVE>CVE-2025-8732</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:python3-libxml2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254116-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-8732.html</URL>
        <Description>CVE-2025-8732</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247850</URL>
        <Description>SUSE Bug 1247850</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Uncontrolled recursion in  XPath evaluation  in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEvalExpr` were resetting recursion depth to zero before making potentially recursive calls. When such functions were called recursively this could allow for uncontrolled recursion and lead to a stack overflow. These functions now preserve recursion depth across recursive calls, allowing recursion depth to be controlled.</Note>
    </Notes>
    <CVE>CVE-2025-9714</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Container suse/manager/4.3/proxy-httpd:latest:python3-libxml2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.3:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro-rancher/5.4:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro/5.3/toolbox:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>Container suse/sle-micro/5.4/toolbox:latest:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:libxml2-tools-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.3:python3-libxml2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:libxml2-2-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:libxml2-tools-2.9.14-150400.5.50.1</ProductID>
        <ProductID>SUSE Linux Enterprise Micro 5.4:python3-libxml2-2.9.14-150400.5.50.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL>https://www.suse.com/support/update/announcement/2025/suse-su-20254116-1/</URL>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-9714.html</URL>
        <Description>CVE-2025-9714</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1249076</URL>
        <Description>SUSE Bug 1249076</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
