{"affected":[{"ecosystem_specific":{"binaries":[{"libexslt0":"1.1.38-8.1","libxml2-2":"2.11.6-12.1","libxml2-tools":"2.11.6-12.1","libxslt1":"1.1.38-8.1","python311-libxml2":"2.11.6-12.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"libxml2","purl":"pkg:rpm/suse/libxml2&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.6-12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libexslt0":"1.1.38-8.1","libxml2-2":"2.11.6-12.1","libxml2-tools":"2.11.6-12.1","libxslt1":"1.1.38-8.1","python311-libxml2":"2.11.6-12.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"libxml2-python","purl":"pkg:rpm/suse/libxml2-python&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"2.11.6-12.1"}],"type":"ECOSYSTEM"}]},{"ecosystem_specific":{"binaries":[{"libexslt0":"1.1.38-8.1","libxml2-2":"2.11.6-12.1","libxml2-tools":"2.11.6-12.1","libxslt1":"1.1.38-8.1","python311-libxml2":"2.11.6-12.1"}]},"package":{"ecosystem":"SUSE:Linux Micro 6.0","name":"libxslt","purl":"pkg:rpm/suse/libxslt&distro=SUSE%20Linux%20Micro%206.0"},"ranges":[{"events":[{"introduced":"0"},{"fixed":"1.1.38-8.1"}],"type":"ECOSYSTEM"}]}],"aliases":[],"details":"This update for libxslt, libxml2 fixes the following issues:\n\nChanges in libxml2:\n\n- CVE-2026-0990: call stack overflow may lead to application crash due to infinite recursion in\n  `xmlCatalogXMLResolveURI` (bsc#1256807, bsc#1256811).\n- CVE-2026-0992: excessive resource consumption when processing XML catalogs due to exponential behavior when handling\n  `nextCatalog` elements (bsc#1256809, bsc#1256812).\n- CVE-2025-8732: infinite recursion in catalog parsing functions when processing malformed SGML catalog files\n  (bsc#1247858).\n- CVE-2026-1757: memory leak in the `xmllint` interactive shell (bsc#1257594, bsc#1257595).\n- CVE-2025-10911: parsing xsl nodes may lead to use-after-free with key data stored cross-RVT (bsc#1250553).\n","id":"SUSE-SU-2026:20707-1","modified":"2026-03-06T11:53:41Z","published":"2026-03-06T11:53:41Z","references":[{"type":"ADVISORY","url":"https://www.suse.com/support/update/announcement/2026/suse-su-202620707-1/"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247850"},{"type":"REPORT","url":"https://bugzilla.suse.com/1247858"},{"type":"REPORT","url":"https://bugzilla.suse.com/1250553"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256804"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256805"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256807"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256808"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256809"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256810"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256811"},{"type":"REPORT","url":"https://bugzilla.suse.com/1256812"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257593"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257594"},{"type":"REPORT","url":"https://bugzilla.suse.com/1257595"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-10911"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2025-8732"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0989"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0990"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-0992"},{"type":"WEB","url":"https://www.suse.com/security/cve/CVE-2026-1757"}],"related":["CVE-2025-10911","CVE-2025-8732","CVE-2026-0989","CVE-2026-0990","CVE-2026-0992","CVE-2026-1757"],"summary":"Security update for libxslt, libxml2","upstream":["CVE-2025-10911","CVE-2025-8732","CVE-2026-0989","CVE-2026-0990","CVE-2026-0992","CVE-2026-1757"]}