There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
https://www.oracle.com/security-alerts/cpuoct2021.html
https://www.oracle.com/security-alerts/cpujul2022.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://support.apple.com/kb/HT212605
https://support.apple.com/kb/HT212604
https://support.apple.com/kb/HT212602
https://support.apple.com/kb/HT212601
https://security.netapp.com/advisory/ntap-20210625-0002/
https://security.gentoo.org/glsa/202107-05
https://lists.debian.org/debian-lts-announce/2021/05/msg00008.html
https://bugzilla.redhat.com/show_bug.cgi?id=1954242
http://seclists.org/fulldisclosure/2021/Jul/59
http://seclists.org/fulldisclosure/2021/Jul/58