libxml2 2.9.8, if --with-lzma is used, allows remote attackers to cause a denial of service (infinite loop) via a crafted XML file that triggers LZMA_MEMLIMIT_ERROR, as demonstrated by xmllint, a different vulnerability than CVE-2015-8035 and CVE-2018-9251. Upstream Patch: https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912054af025fb6e01e26375100275e74
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1619878] Created mingw-libxml2 tracking bugs for this issue: Affects: epel-7 [bug 1619880] Affects: fedora-all [bug 1619879]
RHEL5/6 use a libxml2 version released before it had LZMA support.
Statement: Red Hat Product Security has rated this flaw as having Low impact. A future update may address this issue.
This was introduced in upstream version 2.9.6 via the following commit: https://gitlab.gnome.org/GNOME/libxml2/commit/e2a9122b8d
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1190 https://access.redhat.com/errata/RHSA-2020:1190
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2018-14567