{"id":"MGASA-2014-0418","summary":"Updated libxml2 packages fix security vulnerability","details":"A denial of service flaw was found in libxml2, a library providing support\nto read, modify and write XML and HTML files. A remote attacker could\nprovide a specially crafted XML file that, when processed by an application\nusing libxml2, would lead to excessive CPU consumption (denial of service)\nbased on excessive entity substitutions, even if entity substitution was\ndisabled, which is the parser default behavior (CVE-2014-3660).\n","modified":"2026-01-30T08:24:08.220180Z","published":"2014-10-23T13:27:57Z","related":["CVE-2014-3660"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2014-0418.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=14315"},{"type":"REPORT","url":"https://rhn.redhat.com/errata/RHSA-2014-1655.html"}],"affected":[{"package":{"name":"libxml2","ecosystem":"Mageia:3","purl":"pkg:rpm/mageia/libxml2?arch=source&distro=mageia-3"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.0-5.4.mga3"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0418.json"}},{"package":{"name":"libxml2","ecosystem":"Mageia:4","purl":"pkg:rpm/mageia/libxml2?arch=source&distro=mageia-4"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.1-2.2.mga4"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2014-0418.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}