| From: |
| Marc Deslauriers <marc.deslauriers@canonical.com> |
| To: |
| ubuntu-security-announce@lists.ubuntu.com |
| Subject: |
| [USN-1782-1] libxml2 vulnerability |
| Date: |
| Thu, 28 Mar 2013 10:23:12 -0400 |
| Message-ID: |
| <51545250.3030407@canonical.com> |
| Archive-link: |
| Article, Thread
|
==========================================================================
Ubuntu Security Notice USN-1782-1
March 28, 2013
libxml2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 11.10
- Ubuntu 10.04 LTS
- Ubuntu 8.04 LTS
Summary:
libxml2 could be made to hang if it received specially crafted input.
Software Description:
- libxml2: GNOME XML library
Details:
It was discovered that libxml2 incorrectly handled XML entity expansion.
An attacker could use this flaw to cause libxml2 to consume large amounts
of resources, resulting in a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 12.10:
libxml2 2.8.0+dfsg1-5ubuntu2.2
Ubuntu 12.04 LTS:
libxml2 2.7.8.dfsg-5.1ubuntu4.4
Ubuntu 11.10:
libxml2 2.7.8.dfsg-4ubuntu0.6
Ubuntu 10.04 LTS:
libxml2 2.7.6.dfsg-1ubuntu1.8
Ubuntu 8.04 LTS:
libxml2 2.6.31.dfsg-2ubuntu1.12
After a standard system update you need to reboot your computer to make
all the necessary changes.
References:
http://www.ubuntu.com/usn/usn-1782-1
CVE-2013-0338
Package Information:
https://launchpad.net/ubuntu/+source/libxml2/2.8.0+dfsg1-...
https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-5...
https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-4...
https://launchpad.net/ubuntu/+source/libxml2/2.7.6.dfsg-1...
https://launchpad.net/ubuntu/+source/libxml2/2.6.31.dfsg-...
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at:
https://lists.ubuntu.com/mailman/listinfo/ubuntu-security...
(
Log in to post comments)