A flaw was found in libxml2 before 2.9.6. The xz_head function in xzlib.c in allows remote attackers to cause a denial of service (memory consumption) via a crafted LZMA file, because the decoder functionality does not restrict memory usage to what is required for a legitimate file. References: https://git.gnome.org/browse/libxml2/commit/?id=e2a9122b8dde53d320750451e9907a7dcb2ca8bb
Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1566751] Affects: epel-7 [bug 1566750]
Note that this patch introduced another vulnerability: CVE-2018-14567 (flaw bug 1619875), which was in turn fixed by: https://gitlab.gnome.org/GNOME/libxml2/commit/2240fbf5912
This issue has been addressed in the following products: Red Hat Enterprise Linux 7 Via RHSA-2020:1190 https://access.redhat.com/errata/RHSA-2020:1190
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2017-18258