MGASA-2014-0214

Source
https://advisories.mageia.org/MGASA-2014-0214.html
Import Source
https://advisories.mageia.org/MGASA-2014-0214.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0214
Related
Published
2014-05-10T19:46:24Z
Modified
2014-05-10T19:45:50Z
Summary
Updated libxml2 packages fix CVE-2014-0191
Details

Updated libxml2 packages fix security vulnerability:

It was discovered that libxml2, a library providing support to read, modify and write XML files, incorrectly performs entity substituton in the doctype prolog, even if the application using libxml2 disabled any entity substitution. A remote attacker could provide a specially-crafted XML file that, when processed, would lead to the exhaustion of CPU and memory resources or file descriptors (CVE-2014-0191).

References
Credits

Affected packages

Mageia:3 / libxml2

Package

Name
libxml2
Purl
pkg:rpm/mageia/libxml2?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.0-5.3.mga3

Ecosystem specific

{
    "section": "core"
}

Mageia:4 / libxml2

Package

Name
libxml2
Purl
pkg:rpm/mageia/libxml2?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.1-2.1.mga4

Ecosystem specific

{
    "section": "core"
}