{"affected":[{"ecosystem_specific":{"binaries":[{"libexslt0":"1.1.38-slfo.1.1_6.1","libxml2-2":"2.11.6-slfo.1.1_8.1","libxml2-tools":"2.11.6-slfo.1.1_8.1","libxslt1":"1.1.38-slfo.1.1_6.1","python311-libxml2":"2.11.6-slfo.1.1_8.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"libxml2","purl":"pkg:rpm/suse/libxml2&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.6-slfo.1.1_8.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libexslt0":"1.1.38-slfo.1.1_6.1","libxml2-2":"2.11.6-slfo.1.1_8.1","libxml2-tools":"2.11.6-slfo.1.1_8.1","libxslt1":"1.1.38-slfo.1.1_6.1","python311-libxml2":"2.11.6-slfo.1.1_8.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"libxml2-python","purl":"pkg:rpm/suse/libxml2-python&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.6-slfo.1.1_8.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libexslt0":"1.1.38-slfo.1.1_6.1","libxml2-2":"2.11.6-slfo.1.1_8.1","libxml2-tools":"2.11.6-slfo.1.1_8.1","libxslt1":"1.1.38-slfo.1.1_6.1","python311-libxml2":"2.11.6-slfo.1.1_8.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.1","name":"libxslt","purl":"pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Micro%206.1"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.38-slfo.1.1_6.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libxslt, libxml2 fixes the following issues:\n\nlibxml2:\n\n- CVE-2026-0990: call stack overflow leading to application crash \n  due to infinite recursion in `xmlCatalogXMLResolveURI` (bsc#1256807, bsc#1256811)\n\n- CVE-2026-0992: excessive resource consumption when processing XML \n  catalogs due to exponential behavior when handling `<nextCatalog>` elements (bsc#1256808, bsc#1256809, bsc#1256812)\n\n- CVE-2025-8732: infinite recursion in catalog parsing functions when processing malformed SGML catalog files (bsc#1247858, bsc#1247850)\n\n- CVE-2026-1757: memory leak in the `xmllint` interactive shell (bsc#1257593, bsc#1257594, bsc#1257595)\n\n- CVE-2025-10911: use-after-free with key data stored cross-RVT (bsc#1250553)\n\n- CVE-2026-0989: call stack exhaustion leading to application crash \n  due to RelaxNG parser not limiting the recursion depth when \n  resolving `<include>` directives (bsc#1256804, bsc#1256805, bsc#1256810)\n\nlibxslt:\n\n- CVE-2025-10911 will be fixed on libxml2 side instead [bsc#1250553]\n","id":"SUSE-SU-2026:20657-1","modified":"2026-03-06T11:37:27Z","published":"2026-03-06T11:37:27Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620657-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256804"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256811"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257594"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-10911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-8732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1757"}],"related":["CVE-2025-10911","CVE-2025-8732","CVE-2026-0989","CVE-2026-0990","CVE-2026-0992","CVE-2026-1757"],"summary":"Security update for libxslt, libxml2","upstream":["CVE-2025-10911","CVE-2025-8732","CVE-2026-0989","CVE-2026-0990","CVE-2026-0992","CVE-2026-1757"]}