parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "libxml2": "2.9.1+dfsg1-3ubuntu4.4", "libxml2-dev": "2.9.1+dfsg1-3ubuntu4.4", "libxml2-utils": "2.9.1+dfsg1-3ubuntu4.4", "libxml2-doc": "2.9.1+dfsg1-3ubuntu4.4", "libxml2-dbg": "2.9.1+dfsg1-3ubuntu4.4", "libxml2-utils-dbg": "2.9.1+dfsg1-3ubuntu4.4", "libxml2-udeb": "2.9.1+dfsg1-3ubuntu4.4", "python-libxml2-dbg": "2.9.1+dfsg1-3ubuntu4.4", "python-libxml2": "2.9.1+dfsg1-3ubuntu4.4" } ] }