libxml2 is vulnerable to remote code execution. The vulnerability exists due to a use after free in libxml2 in xmlXIncludeDoProcess() in xinclude.c.
seclists.org/fulldisclosure/2021/Jul/54
seclists.org/fulldisclosure/2021/Jul/55
seclists.org/fulldisclosure/2021/Jul/58
seclists.org/fulldisclosure/2021/Jul/59
bugzilla.redhat.com/show_bug.cgi?id=1954242
lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
lists.debian.org/debian-lts-announce/2021/05/msg00008.html
lists.fedoraproject.org/archives/list/[email protected]/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
lists.fedoraproject.org/archives/list/[email protected]/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
security-tracker.debian.org/tracker/CVE-2021-3518
security.gentoo.org/glsa/202107-05
security.netapp.com/advisory/ntap-20210625-0002/
support.apple.com/kb/HT212601
support.apple.com/kb/HT212602
support.apple.com/kb/HT212604
support.apple.com/kb/HT212605
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujul2022.html
www.oracle.com/security-alerts/cpuoct2021.html