{"id":"MGASA-2016-0187","summary":"Updated libxml2 packages fix security vulnerability","details":"When running in recovery mode, certain invalid XML documents would trigger\nan infinite recursion in libxml2 that ran until all stack space was\nexhausted. This vulnerability could have been used to facilitate a\ndenial-of-sevice attack (CVE-2016-3627).\n\nlibxml2 limits the number of recursions an XML document can contain so to\nprotect against the \"Billion Laughs\" denial-of-service attack.\nUnfortunately, the underlying counter was not incremented properly in all\nnecessary locations. Therefore, specially crafted XML documents could\nexhaust all available stack space and crash the XML parser without running\ninto the recursion limit (CVE-2016-3705).\n","modified":"2026-02-02T01:21:21.246980Z","published":"2016-05-20T11:38:30Z","related":["CVE-2016-3627","CVE-2016-3705"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0187.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18346"},{"type":"REPORT","url":"http://openwall.com/lists/oss-security/2016/05/03/4"},{"type":"REPORT","url":"https://lists.opensuse.org/opensuse-updates/2016-05/msg00055.html"}],"affected":[{"package":{"name":"libxml2","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/libxml2?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.3-1.1.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0187.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}