{
  "document": {
    "aggregate_severity": {
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2024-34459: fix buffer over-read in xmlHTMLPrintFileContext in xmllint\n- CVE-2025-8732: fix stack overflow from self-referencing SGML CATALOG entries\n- CVE-2026-0989: add RelaxNG include recursion limit\n- CVE-2026-0990: prevent infinite recursion in xmlCatalogListXMLResolveURI\n- CVE-2026-0992: ignore repeated nextCatalog entries in XML catalog parsing\n- CVE-2026-1757: fix memory leak in xmllint interactive shell",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/almalinux9.2esu/advisories/2026/clsa-2026_1775649722.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-08T13:31:51Z",
      "generator": {
        "date": "2026-04-08T13:31:51Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1775649722",
      "initial_release_date": "2026-04-08T12:02:04Z",
      "revision_history": [
        {
          "date": "2026-04-08T12:02:04Z",
          "number": "1",
          "summary": "Initial version"
        },
        {
          "date": "2026-04-08T13:31:51Z",
          "number": "2",
          "summary": "Official Publication"
        }
      ],
      "status": "final",
      "version": "2"
    },
    "title": "libxml2: Fix of 6 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.2",
                "product": {
                  "name": "AlmaLinux 9.2",
                  "product_id": "AlmaLinux-9.2",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.2:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
                "product": {
                  "name": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
                  "product_id": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2-devel@2.9.13-3.el9_2.1.tuxcare.els12?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
                "product": {
                  "name": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
                  "product_id": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2@2.9.13-3.el9_2.1.tuxcare.els12?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                "product": {
                  "name": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_id": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2-devel@2.9.13-3.el9_2.1.tuxcare.els12?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                "product": {
                  "name": "python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_id": "python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python3-libxml2@2.9.13-3.el9_2.1.tuxcare.els12?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                "product": {
                  "name": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_id": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2@2.9.13-3.el9_2.1.tuxcare.els12?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                "product": {
                  "name": "libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_id": "libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2-static@2.9.13-3.el9_2.1.tuxcare.els12?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686"
        },
        "product_reference": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        },
        "product_reference": "libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        },
        "product_reference": "python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686"
        },
        "product_reference": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        },
        "product_reference": "libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64 as a component of AlmaLinux 9.2",
          "product_id": "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        },
        "product_reference": "libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.2"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2026-1757",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-1757"
        }
      ],
      "release_date": "2026-02-02T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T12:02:04.998983Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722",
          "product_ids": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2026-0990",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-0990"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-0990",
          "url": "https://access.redhat.com/security/cve/CVE-2026-0990"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2429959",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429959"
        }
      ],
      "release_date": "2026-01-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T12:02:04.998983Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722",
          "product_ids": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2026-0992",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-0992"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-0992",
          "url": "https://access.redhat.com/security/cve/CVE-2026-0992"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2429975",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429975"
        }
      ],
      "release_date": "2026-01-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T12:02:04.998983Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722",
          "product_ids": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2024-34459",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-34459"
        }
      ],
      "release_date": "2024-05-08T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T12:02:04.998983Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722",
          "product_ids": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2026-0989",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-0989"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-0989",
          "url": "https://access.redhat.com/security/cve/CVE-2026-0989"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2429933",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429933"
        }
      ],
      "release_date": "2026-01-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T12:02:04.998983Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722",
          "product_ids": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2025-8732",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that \"[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
          "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
          "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-8732"
        }
      ],
      "release_date": "2025-08-08T16:32:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-08T12:02:04.998983Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722",
          "product_ids": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775649722"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.i686",
            "AlmaLinux-9.2:libxml2-devel-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:libxml2-static-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64",
            "AlmaLinux-9.2:python3-libxml2-0:2.9.13-3.el9_2.1.tuxcare.els12.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    }
  ]
}