CVE-2014-3660
Publication date 16 October 2014
Last updated 24 July 2024
Ubuntu priority
parser.c in libxml2 before 2.9.2 does not properly prevent entity expansion even when entity substitution has been disabled, which allows context-dependent attackers to cause a denial of service (CPU consumption) via a crafted XML document containing a large number of nested entity references, a variant of the "billion laughs" attack.
Status
Package | Ubuntu Release | Status |
---|---|---|
libxml2 | ||
14.04 LTS trusty |
Fixed 2.9.1+dfsg1-3ubuntu4.4
|
|
References
Related Ubuntu Security Notices (USN)
- USN-2389-1
- libxml2 vulnerability
- 27 October 2014