MGASA-2014-0418

Source
https://advisories.mageia.org/MGASA-2014-0418.html
Import Source
https://advisories.mageia.org/MGASA-2014-0418.json
JSON Data
https://api.osv.dev/v1/vulns/MGASA-2014-0418
Related
Published
2014-10-23T13:27:57Z
Modified
2014-10-23T13:07:31Z
Summary
Updated libxml2 packages fix security vulnerability
Details

A denial of service flaw was found in libxml2, a library providing support to read, modify and write XML and HTML files. A remote attacker could provide a specially crafted XML file that, when processed by an application using libxml2, would lead to excessive CPU consumption (denial of service) based on excessive entity substitutions, even if entity substitution was disabled, which is the parser default behavior (CVE-2014-3660).

References
Credits

Affected packages

Mageia:4 / libxml2

Package

Name
libxml2
Purl
pkg:rpm/mageia/libxml2?distro=mageia-4

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.1-2.2.mga4

Ecosystem specific

{
    "section": "core"
}

Mageia:3 / libxml2

Package

Name
libxml2
Purl
pkg:rpm/mageia/libxml2?distro=mageia-3

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.9.0-5.4.mga3

Ecosystem specific

{
    "section": "core"
}