Nixpkgs security tracker

Login with GitHub

Details of issue NIXPKGS-2026-0014

NIXPKGS-2026-0014
published on
Permalink CVE-2026-0992
2.9 LOW
  • CVSS version: 3.1
  • Attack vector (AV): LOCAL
  • Attack complexity (AC): HIGH
  • Privileges required (PR): NONE
  • User interaction (UI): NONE
  • Scope (S): UNCHANGED
  • Confidentiality impact (C): NONE
  • Integrity impact (I): NONE
  • Availability impact (A): LOW
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package libxml2Python
  • @LeSuisse removed package sbclPackages.cl-libxml2
  • @LeSuisse removed package perlPackages.AlienLibxml2
  • @LeSuisse removed package python312Packages.libxml2
  • @LeSuisse removed package python313Packages.libxml2
  • @LeSuisse removed package perl538Packages.AlienLibxml2
  • @LeSuisse removed package perl540Packages.AlienLibxml2
  • @LeSuisse removed package tests.pkg-config.defaultPkgConfigPackages."libxml-2.0"
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Libxml2: libxml2: denial of service via crafted xml catalogs

A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.

References

Affected products

rhcos
libxml2

Matching in nixpkgs

Package maintainers

Fix MR: https://gitlab.gnome.org/GNOME/libxml2/-/merge_requests/368