A flaw in libxml2 allows remote XML entity inclusion with default parser flags (i.e., when the caller did not request entity substitution, DTD validation, external DTD subset loading, or default DTD attributes). Depending on the context, this may expose a higher-risk attack surface in libxml2 not usually reachable with default parser flags, and expose content from local files, HTTP, or FTP servers (which might be otherwise unreachable).
www.securityfocus.com/bid/98877
www.securitytracker.com/id/1038623
android.googlesource.com/platform/external/libxml2/+/308396a55280f69ad4112d4f9892f4cbeff042aa
bugzilla.redhat.com/show_bug.cgi?id=1462203
git.gnome.org/browse/libxml2/commit/?id=90ccb58242866b0ba3edbef8fe44214a101c2b3e
security.gentoo.org/glsa/201711-01
source.android.com/security/bulletin/2017-06-01
www.debian.org/security/2017/dsa-3952