{"id":"MGASA-2021-0213","summary":"Updated libxml2 packages fix security vulnerabilities","details":"The updated packages fix security vulnerabilities:\n\nUse-after-free in xmlEncodeEntitiesInternal() in entities.c.\n(CVE-2021-3516)\n\nHeap-based buffer overflow in xmlEncodeEntitiesInternal() in\nentities.c. (CVE-2021-3517)\n\nUse-after-free in xmlXIncludeDoProcess() in xinclude.c.\n(CVE-2021-3518)\n\nNULL pointer dereference in valid.c in xmlValidBuildAContentModel.\n(CVE-2021-3537)\n","modified":"2026-02-01T17:50:40.789087Z","published":"2021-05-19T19:29:59Z","related":["CVE-2021-3516","CVE-2021-3517","CVE-2021-3518","CVE-2021-3537"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2021-0213.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=28902"},{"type":"REPORT","url":"https://www.debian.org/lts/security/2021/dla-2653"},{"type":"REPORT","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HLCJPB5W3FKJ7HO6DH6UVA3GP6IVZ37L/"},{"type":"REPORT","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/"}],"affected":[{"package":{"name":"libxml2","ecosystem":"Mageia:7","purl":"pkg:rpm/mageia/libxml2?arch=source&distro=mageia-7"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.9-2.6.mga7"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0213.json"}},{"package":{"name":"libxml2","ecosystem":"Mageia:8","purl":"pkg:rpm/mageia/libxml2?arch=source&distro=mageia-8"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.9.10-7.1.mga8"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2021-0213.json"}}],"schema_version":"1.7.3","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}