{
  "document": {
    "aggregate_severity": {
      "text": "Moderate"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "TuxCare License Agreement",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "legal_disclaimer",
        "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Cloud Linux Inc. and provide a link to the original.",
        "title": "Terms of Use"
      },
      {
        "category": "details",
        "text": "CVE-2023-45322: fix use-after-free in xmlStaticCopyNodeList when copying DTDs\n- CVE-2024-34459: fix buffer over-read in xmlHTMLPrintFileContext in xmllint\n- CVE-2025-6170: fix potential buffer overflows in xmllint interactive shell\n- CVE-2025-8732: fix stack overflow from self-referencing SGML CATALOG entries\n- CVE-2026-0989: add RelaxNG include recursion limit\n- CVE-2026-0990: prevent infinite recursion in xmlCatalogListXMLResolveURI\n- CVE-2026-0992: ignore repeated nextCatalog entries in XML catalog parsing\n- CVE-2026-1757: fix memory leak in xmllint interactive shell",
        "title": "Details"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://tuxcare.com/contact/",
      "name": "TuxCare",
      "namespace": "https://tuxcare.com/"
    },
    "references": [
      {
        "category": "self",
        "summary": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
        "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
      },
      {
        "category": "self",
        "summary": "Canonical URL",
        "url": "https://security.tuxcare.com/csaf/v2/els_os/tuxcare9.6esu/advisories/2026/clsa-2026_1775731413.json"
      }
    ],
    "tracking": {
      "current_release_date": "2026-04-09T10:44:43Z",
      "generator": {
        "date": "2026-04-09T10:44:43Z",
        "engine": {
          "name": "pyCSAF"
        }
      },
      "id": "CLSA-2026:1775731413",
      "initial_release_date": "2026-04-09T10:44:43Z",
      "revision_history": [
        {
          "date": "2026-04-09T10:44:43Z",
          "number": "1",
          "summary": "Initial version"
        }
      ],
      "status": "final",
      "version": "1"
    },
    "title": "libxml2: Fix of 8 CVEs"
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "AlmaLinux 9.6",
                "product": {
                  "name": "AlmaLinux 9.6",
                  "product_id": "AlmaLinux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:almalinux:almalinux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "AlmaLinux"
          }
        ],
        "category": "vendor",
        "name": "AlmaLinux OS Foundation"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_name",
                "name": "Rocky Linux 9.6",
                "product": {
                  "name": "Rocky Linux 9.6",
                  "product_id": "Rocky Linux-9.6",
                  "product_identification_helper": {
                    "cpe": "cpe:2.3:o:resf:rocky_linux:9.6:*:*:*:*:*:*:*"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "Rocky Linux"
          }
        ],
        "category": "vendor",
        "name": "Rocky Linux"
      },
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
                "product": {
                  "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
                  "product_id": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2-devel@2.9.13-12.el9_6.tuxcare.els3?arch=i686"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
                "product": {
                  "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
                  "product_id": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2@2.9.13-12.el9_6.tuxcare.els3?arch=i686"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "i686"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                "product": {
                  "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_id": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2-devel@2.9.13-12.el9_6.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                "product": {
                  "name": "libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_id": "libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2-static@2.9.13-12.el9_6.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                "product": {
                  "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_id": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/libxml2@2.9.13-12.el9_6.tuxcare.els3?arch=x86_64"
                  }
                }
              },
              {
                "category": "product_version",
                "name": "python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                "product": {
                  "name": "python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_id": "python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
                  "product_identification_helper": {
                    "purl": "pkg:rpm/tuxcare/python3-libxml2@2.9.13-12.el9_6.tuxcare.els3?arch=x86_64"
                  }
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          }
        ],
        "category": "vendor",
        "name": "TuxCare"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686"
        },
        "product_reference": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686"
        },
        "product_reference": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of AlmaLinux 9.6",
          "product_id": "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "AlmaLinux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686"
        },
        "product_reference": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686"
        },
        "product_reference": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64 as a component of Rocky Linux 9.6",
          "product_id": "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        },
        "product_reference": "python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
        "relates_to_product_reference": "Rocky Linux-9.6"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-6170",
      "cwe": {
        "id": "CWE-121",
        "name": "Stack-based Buffer Overflow"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code in rare configurations without modern protections.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-6170"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2025-6170",
          "url": "https://access.redhat.com/security/cve/CVE-2025-6170"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2372952",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2372952"
        },
        {
          "category": "external",
          "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/941",
          "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/941"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/07/msg00014.html"
        }
      ],
      "release_date": "2025-06-16T16:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 2.5,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2026-1757",
      "cwe": {
        "id": "CWE-401",
        "name": "Missing Release of Memory after Effective Lifetime"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command execution but fails to free the allocated buffer. Repeating this action causes memory to continuously accumulate. Over time, this can exhaust system memory and terminate the xmllint process, creating a denial-of-service condition on the local system.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-1757"
        }
      ],
      "release_date": "2026-02-02T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2026-0990",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent issue by providing a specially crafted XML catalog, leading to infinite recursion and call stack exhaustion. This ultimately results in a segmentation fault, causing a Denial of Service (DoS) by crashing affected applications.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-0990"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-0990",
          "url": "https://access.redhat.com/security/cve/CVE-2026-0990"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2429959",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429959"
        }
      ],
      "release_date": "2026-01-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2023-45322",
      "cwe": {
        "id": "CWE-416",
        "name": "Use After Free"
      },
      "notes": [
        {
          "category": "description",
          "text": "libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor's position is \"I don't think these issues are critical enough to warrant a CVE ID ... because an attacker typically can't control when memory allocations fail.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2023-45322"
        },
        {
          "category": "external",
          "summary": "http://www.openwall.com/lists/oss-security/2023/10/06/5",
          "url": "http://www.openwall.com/lists/oss-security/2023/10/06/5"
        },
        {
          "category": "external",
          "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/344",
          "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/344"
        },
        {
          "category": "external",
          "summary": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/583",
          "url": "https://gitlab.gnome.org/GNOME/libxml2/-/issues/583"
        },
        {
          "category": "external",
          "summary": "https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html",
          "url": "https://lists.debian.org/debian-lts-announce/2025/02/msg00028.html"
        }
      ],
      "release_date": "2023-10-06T22:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 6.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2026-0992",
      "cwe": {
        "id": "CWE-400",
        "name": "Uncontrolled Resource Consumption"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-0992"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-0992",
          "url": "https://access.redhat.com/security/cve/CVE-2026-0992"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2429975",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429975"
        }
      ],
      "release_date": "2026-01-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 2.9,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2024-34459",
      "cwe": {
        "id": "CWE-126",
        "name": "Buffer Over-read"
      },
      "notes": [
        {
          "category": "description",
          "text": "An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2024-34459"
        }
      ],
      "release_date": "2024-05-08T00:00:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Moderate"
        }
      ]
    },
    {
      "cve": "CVE-2026-0989",
      "cwe": {
        "id": "CWE-674",
        "name": "Uncontrolled Recursion"
      },
      "notes": [
        {
          "category": "description",
          "text": "A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested <include> directives. Specially crafted or overly complex schemas can cause excessive recursion during parsing. This may lead to stack exhaustion and application crashes, creating a denial-of-service risk.",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2026-0989"
        },
        {
          "category": "external",
          "summary": "https://access.redhat.com/security/cve/CVE-2026-0989",
          "url": "https://access.redhat.com/security/cve/CVE-2026-0989"
        },
        {
          "category": "external",
          "summary": "https://bugzilla.redhat.com/show_bug.cgi?id=2429933",
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2429933"
        }
      ],
      "release_date": "2026-01-15T15:15:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "LOW",
            "baseScore": 3.7,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    },
    {
      "cve": "CVE-2025-8732",
      "cwe": {
        "id": "CWE-776",
        "name": "Improper Restriction of Recursive Entity References in DTDs ('XML Entity Expansion')"
      },
      "notes": [
        {
          "category": "description",
          "text": "A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The code maintainer explains, that \"[t]he issue can only be triggered with untrusted SGML catalogs and it makes absolutely no sense to use untrusted catalogs. I also doubt that anyone is still using SGML catalogs at all.\"",
          "title": "Vulnerability description"
        },
        {
          "category": "general",
          "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product's status, and are included for informational purposes to better understand the severity of this vulnerability.",
          "title": "CVSS score applicability"
        }
      ],
      "product_status": {
        "fixed": [
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
          "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
          "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
        ]
      },
      "references": [
        {
          "category": "self",
          "summary": "Canonical URL",
          "url": "https://cve.tuxcare.com/els/cve/CVE-2025-8732"
        }
      ],
      "release_date": "2025-08-08T16:32:00Z",
      "remediations": [
        {
          "category": "vendor_fix",
          "date": "2026-04-09T10:43:35.933317Z",
          "details": "Details on how to apply the fix are available at: https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413",
          "product_ids": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ],
          "url": "https://cve.tuxcare.com/els/releases/CLSA-2026:1775731413"
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "LOW",
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "AlmaLinux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "AlmaLinux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.i686",
            "Rocky Linux-9.6:libxml2-devel-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:libxml2-static-0:2.9.13-12.el9_6.tuxcare.els3.x86_64",
            "Rocky Linux-9.6:python3-libxml2-0:2.9.13-12.el9_6.tuxcare.els3.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "details": "Low"
        }
      ]
    }
  ]
}