A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
Acknowledgments: Name: Sebastian Pipping
This flaw is essentially a variant of the billion laughs attack which can DoS libxml2 even with the set of safe flags. The original billion laughs attack was fixed in libxml2 via https://access.redhat.com/security/cve/CVE-2003-1564 Expat packages shipped in Red Hat products and the upstream project are still vulnerable to billion laughs attack.
Created libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1960153] Created mingw-libxml2 tracking bugs for this issue: Affects: fedora-all [bug 1960154]
Upstream patch: https://gitlab.gnome.org/GNOME/libxml2/-/commit/8598060bacada41a0eb09d95c97744ff4e428f8e Upstream bug: https://gitlab.gnome.org/GNOME/libxml2/-/issues/228 (currently private)
This issue has been addressed in the following products: Red Hat Enterprise Linux 8 Via RHSA-2021:2569 https://access.redhat.com/errata/RHSA-2021:2569
This bug is now closed. Further updates for individual products will be reflected on the CVE page(s): https://access.redhat.com/security/cve/cve-2021-3541
This issue has been addressed in the following products: Red Hat JBoss Core Services Via RHSA-2022:1390 https://access.redhat.com/errata/RHSA-2022:1390
This issue has been addressed in the following products: JBoss Core Services on RHEL 7 JBoss Core Services for RHEL 8 Via RHSA-2022:1389 https://access.redhat.com/errata/RHSA-2022:1389