Vulnerability Description
A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
CVSS Score
LOW
Related Weaknesses (CWE)
References
- https://access.redhat.com/errata/RHSA-2026:7519
- https://access.redhat.com/security/cve/CVE-2026-0992
- https://bugzilla.redhat.com/show_bug.cgi?id=2429975
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019
FAQ
What is CVE-2026-0992?
CVE-2026-0992 is a vulnerability with a CVSS score of 2.9 (LOW). A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same down...
How severe is CVE-2026-0992?
CVE-2026-0992 has been rated LOW with a CVSS base score of 2.9/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-0992?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.