Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-0992— Libxml2: libxml2: denial of service via crafted xml catalogs

CVSS 2.9 · Low EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-0992

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Libxml2: libxml2: denial of service via crafted xml catalogs
Source: NVD (National Vulnerability Database)
Vulnerability Description
A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
未加控制的资源消耗(资源穷尽)
Source: NVD (National Vulnerability Database)
Vulnerability Title
libxml2 资源管理错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
libxml2是GNOME开源的一个用来解析XML文档的函数库。它用C语言写成,并且能为多种语言所调用,例如C语言,C++,XSH。 libxml2存在资源管理错误漏洞,该漏洞源于处理包含重复指向相同下游目录的<nextCatalog>元素的XML目录时出现不受控制的资源消耗,可能导致远程攻击者通过提供特制目录造成过度CPU消耗和应用程序可用性降低。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Red HatRed Hat Hardened Images 2.15.2-0.3.hum1 ~ * cpe:/a:redhat:hummingbird:1
Red HatRed Hat Enterprise Linux 10-cpe:/o:redhat:enterprise_linux:10
Red HatRed Hat Enterprise Linux 6-cpe:/o:redhat:enterprise_linux:6
Red HatRed Hat Enterprise Linux 7-cpe:/o:redhat:enterprise_linux:7
Red HatRed Hat Enterprise Linux 8-cpe:/o:redhat:enterprise_linux:8
Red HatRed Hat Enterprise Linux 9-cpe:/o:redhat:enterprise_linux:9
Red HatRed Hat JBoss Core Services-cpe:/a:redhat:jboss_core_services:1
Red HatRed Hat OpenShift Container Platform 4-cpe:/a:redhat:openshift:4

II. Public POCs for CVE-2026-0992

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-0992

登录查看更多情报信息。

Same Patch Batch · Red Hat · 2026-01-15 · 4 CVEs total

CVE-2026-09905.9 MEDIUMLibxml2: libxml2: denial of service via uncontrolled recursion in xml catalog processing
CVE-2026-09763.7 LOWOrg.keycloak/keycloak-quarkus-server: keycloak: proxy bypass due to improper handling of m
CVE-2026-09893.7 LOWLibxml2: unbounded relaxng include recursion leading to stack overflow

IV. Related Vulnerabilities

V. Comments for CVE-2026-0992

No comments yet


Leave a comment