USN-2389-1: libxml2 vulnerability
27 October 2014
libxml2 could be made to consume resources if it processed a specially crafted file.
- libxml2 - GNOME XML library
It was discovered that libxml2 would incorrectly perform entity
substitution even when requested not to. If a user or automated system were
tricked into opening a specially crafted document, an attacker could
possibly cause resource consumption, resulting in a denial of service.
The problem can be corrected by updating your system to the following package versions:
After a standard system update you need to reboot your computer to make
all the necessary changes.