CVE-2026-0992
Description
A flaw was found in the libxml2 library. This uncontrolled resource consumption vulnerability occurs when processing XML catalogs that contain repeated <nextCatalog> elements pointing to the same downstream catalog. A remote attacker can exploit this by supplying crafted catalogs, causing the parser to redundantly traverse catalog chains. This leads to excessive CPU consumption and degrades application availability, resulting in a denial-of-service condition.
CWE
- CWE-400 — Uncontrolled Resource Consumption
Affected
- Red Hat / Red Hat Enterprise Linux 10 —
- Red Hat / Red Hat Enterprise Linux 6 —
- Red Hat / Red Hat Enterprise Linux 7 —
- Red Hat / Red Hat Enterprise Linux 8 —
- Red Hat / Red Hat Enterprise Linux 9 —
- Red Hat / Red Hat Hardened Images —
- Red Hat / Red Hat JBoss Core Services —
- Red Hat / Red Hat OpenShift Container Platform 4 —
CVSS
- 3.1 score=2.9 severity=LOW
CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L
References
- https://access.redhat.com/security/cve/CVE-2026-0992 vdb-entry, x_refsource_REDHAT
- https://bugzilla.redhat.com/show_bug.cgi?id=2429975 issue-tracking, x_refsource_REDHAT
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/1019
Source
cvelistV5-main/cves/2026/0xxx/CVE-2026-0992.json