{"id":"ALSA-2021:2569","summary":"Moderate: libxml2 security update","details":"The libxml2 library is a development toolbox providing the implementation of various XML standards.\n\nSecurity Fix(es):\n\n* libxml2: Use-after-free in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3516)\n\n* libxml2: Heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c (CVE-2021-3517)\n\n* libxml2: Use-after-free in xmlXIncludeDoProcess() in xinclude.c (CVE-2021-3518)\n\n* libxml2: NULL pointer dereference when post-validating mixed content parsed in recovery mode (CVE-2021-3537)\n\n* libxml2: Exponential entity expansion attack bypasses all existing protection mechanisms (CVE-2021-3541)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.","modified":"2026-01-30T00:58:50.967179Z","published":"2021-06-29T13:42:19Z","related":["CVE-2021-3516","CVE-2021-3517","CVE-2021-3518","CVE-2021-3537","CVE-2021-3541"],"references":[{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3516"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3517"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3518"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3537"},{"type":"REPORT","url":"https://vulners.com/cve/CVE-2021-3541"}],"affected":[{"package":{"name":"libxml2-devel","ecosystem":"AlmaLinux:8","purl":"pkg:rpm/almalinux/libxml2-devel"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.7-9.el8_4.2"}]}],"database_specific":{"source":"https://github.com/AlmaLinux/osv-database/blob/master/advisories/almalinux8/ALSA-2021:2569.json"}}],"schema_version":"1.7.3"}