VYPR

rpm package

suse/python-libxml2-python&distro=SUSE Linux Enterprise Micro 5.2

pkg:rpm/suse/python-libxml2-python&distro=SUSE%20Linux%20Enterprise%20Micro%205.2

Vulnerabilities (30)

  • CVE-2026-1757MedFeb 2, 2026
    affected < 2.9.7-150000.3.94.1fixed 2.9.7-150000.3.94.1

    A flaw was identified in the interactive shell of the xmllint utility, part of the libxml2 project, where memory allocated for user input is not properly released under certain conditions. When a user submits input consisting only of whitespace, the program skips command executio

  • CVE-2026-0992LowJan 15, 2026
    affected < 2.9.7-150000.3.94.1fixed 2.9.7-150000.3.94.1

    A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs

  • CVE-2026-0990MedJan 15, 2026
    affected < 2.9.7-150000.3.94.1fixed 2.9.7-150000.3.94.1

    A flaw was found in libxml2, an XML parsing library. This uncontrolled recursion vulnerability occurs in the xmlCatalogXMLResolveURI function when an XML catalog contains a delegate URI entry that references itself. A remote attacker could exploit this configuration-dependent iss

  • CVE-2026-0989LowJan 15, 2026
    affected < 2.9.7-150000.3.91.1fixed 2.9.7-150000.3.91.1

    A flaw was identified in the RelaxNG parser of libxml2 related to how external schema inclusions are handled. The parser does not enforce a limit on inclusion depth when resolving nested directives. Specially crafted or overly complex schemas can cause excessive recursi

  • CVE-2025-10911MedSep 25, 2025
    affected < 2.9.7-150000.3.94.1fixed 2.9.7-150000.3.94.1

    A use-after-free vulnerability was found in libxslt while parsing xsl nodes that may lead to the dereference of expired pointers and application crash.

  • CVE-2025-9714MedSep 10, 2025
    affected < 2.9.7-150000.3.88.1fixed 2.9.7-150000.3.88.1

    Uncontrolled recursion in XPath evaluation in libxml2 up to and including version 2.9.14 allows a local attacker to cause a stack overflow via crafted expressions. XPath processing functions `xmlXPathRunEval`, `xmlXPathCtxtCompile`, and `xmlXPathEvalExpr` were resetting recursion

  • CVE-2025-8732LowAug 8, 2025
    affected < 2.9.7-150000.3.88.1fixed 2.9.7-150000.3.88.1

    A vulnerability was found in libxml2 up to 2.14.5. It has been declared as problematic. This vulnerability affects the function xmlParseSGMLCatalog of the component xmlcatalog. The manipulation leads to uncontrolled recursion. Attacking locally is a requirement. The exploit has b

  • CVE-2025-7425HigJul 10, 2025
    affected < 2.9.7-150000.3.85.1fixed 2.9.7-150000.3.85.1

    A flaw was found in libxslt where the attribute type, atype, flags are modified in a way that corrupts internal memory management. When XSLT functions, such as the key() process, result in tree fragments, this corruption prevents the proper cleanup of ID attributes. As a result,

  • CVE-2025-6170LowJun 16, 2025
    affected < 2.9.7-150000.3.82.1fixed 2.9.7-150000.3.82.1

    A flaw was found in the interactive shell of the xmllint command-line tool, used for parsing XML files. When a user inputs an overly long command, the program does not check the input size properly, which can cause it to crash. This issue might allow attackers to run harmful code

  • CVE-2025-49796CriJun 16, 2025
    affected < 2.9.7-150000.3.82.1fixed 2.9.7-150000.3.82.1

    A vulnerability was found in libxml2. Processing certain sch:name elements from the input XML file can trigger a memory corruption issue. This flaw allows an attacker to craft a malicious XML input file that can lead libxml to crash, resulting in a denial of service or other poss

  • CVE-2025-49794CriJun 16, 2025
    affected < 2.9.7-150000.3.82.1fixed 2.9.7-150000.3.82.1

    A use-after-free vulnerability was found in libxml2. This issue occurs when parsing XPath elements under certain circumstances when the XML schematron has the <sch:name path="..."/> schema elements. This flaw allows a malicious actor to craft a malicious XML document used as inpu

  • CVE-2025-6021HigJun 12, 2025
    affected < 2.9.7-150000.3.82.1fixed 2.9.7-150000.3.82.1

    A flaw was found in libxml2's xmlBuildQName function, where integer overflows in buffer size calculations can lead to a stack-based buffer overflow. This issue can result in memory corruption or a denial of service when processing crafted input.

  • CVE-2025-32415Apr 17, 2025
    affected < 2.9.7-150000.3.79.1fixed 2.9.7-150000.3.79.1

    In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be use

  • CVE-2025-32414Apr 8, 2025
    affected < 2.9.7-150000.3.79.1fixed 2.9.7-150000.3.79.1

    In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters.

  • CVE-2025-27113Feb 18, 2025
    affected < 2.9.7-150000.3.76.1fixed 2.9.7-150000.3.76.1

    libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a NULL pointer dereference in xmlPatMatch in pattern.c.

  • CVE-2025-24928Feb 18, 2025
    affected < 2.9.7-150000.3.76.1fixed 2.9.7-150000.3.76.1

    libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a stack-based buffer overflow in xmlSnprintfElements in valid.c. To exploit this, DTD validation must occur for an untrusted document or untrusted DTD. NOTE: this is similar to CVE-2017-9047.

  • CVE-2024-56171Feb 18, 2025
    affected < 2.9.7-150000.3.76.1fixed 2.9.7-150000.3.76.1

    libxml2 before 2.12.10 and 2.13.x before 2.13.6 has a use-after-free in xmlSchemaIDCFillNodeTables and xmlSchemaBubbleIDCNodeTables in xmlschemas.c. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML

  • CVE-2022-49043Jan 26, 2025
    affected < 2.9.7-150000.3.73.1fixed 2.9.7-150000.3.73.1

    xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free.

  • CVE-2024-34459May 13, 2024
    affected < 2.9.7-150000.3.70.1fixed 2.9.7-150000.3.70.1

    An issue was discovered in xmllint (from libxml2) before 2.11.8 and 2.12.x before 2.12.7. Formatting error messages with xmllint --htmlout can result in a buffer over-read in xmlHTMLPrintFileContext in xmllint.c.

  • CVE-2024-25062Feb 4, 2024
    affected < 2.9.7-150000.3.66.1fixed 2.9.7-150000.3.66.1

    An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.

Page 1 of 2