The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.
{
"binaries": [
{
"binary_version": "2.9.1+dfsg1-3ubuntu4.8",
"binary_name": "libxml2"
},
{
"binary_version": "2.9.1+dfsg1-3ubuntu4.8",
"binary_name": "libxml2-dev"
},
{
"binary_version": "2.9.1+dfsg1-3ubuntu4.8",
"binary_name": "libxml2-utils"
},
{
"binary_version": "2.9.1+dfsg1-3ubuntu4.8",
"binary_name": "python-libxml2"
}
],
"availability": "No subscription required"
}
{
"binaries": [
{
"binary_version": "2.9.3+dfsg1-1ubuntu0.1",
"binary_name": "libxml2"
},
{
"binary_version": "2.9.3+dfsg1-1ubuntu0.1",
"binary_name": "libxml2-dev"
},
{
"binary_version": "2.9.3+dfsg1-1ubuntu0.1",
"binary_name": "libxml2-utils"
},
{
"binary_version": "2.9.3+dfsg1-1ubuntu0.1",
"binary_name": "python-libxml2"
}
],
"availability": "No subscription required"
}