libxml2 is vulnerable to denial of service. The vulnerability exists because of heap-based buffer overflow in xmlEncodeEntitiesInternal() in entities.c
bugzilla.redhat.com/show_bug.cgi?id=1954232
lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b@%3Cissues.bookkeeper.apache.org%3E
lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4@%3Cissues.bookkeeper.apache.org%3E
lists.debian.org/debian-lts-announce/2021/05/msg00008.html
lists.fedoraproject.org/archives/list/[email protected]/message/BZOMV5J4PMZAORVT64BKLV6YIZAFDGX6/
lists.fedoraproject.org/archives/list/[email protected]/message/QVM4UJ3376I6ZVOYMHBNX4GY3NIV52WV/
security-tracker.debian.org/tracker/CVE-2021-3517
security.gentoo.org/glsa/202107-05
security.netapp.com/advisory/ntap-20210625-0002/
security.netapp.com/advisory/ntap-20211022-0004/
www.oracle.com/security-alerts/cpuapr2022.html
www.oracle.com/security-alerts/cpujan2022.html
www.oracle.com/security-alerts/cpujul2022.html
www.oracle.com/security-alerts/cpuoct2021.html