USN-3513-1: libxml2 vulnerability
13 December 2017
libxml2 could be made to crash or run arbitrary code if it opened a specially crafted file.
Releases
Packages
- libxml2 - GNOME XML library
Details
It was discovered that libxml2 incorrecty handled certain files. An attacker
could use this issue with specially constructed XML data to cause libxml2 to
consume resources, leading to a denial of service.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 17.10
-
libxml2
-
2.9.4+dfsg1-4ubuntu1.2
-
libxml2-utils
-
2.9.4+dfsg1-4ubuntu1.2
-
python-libxml2
-
2.9.4+dfsg1-4ubuntu1.2
-
python3-libxml2
-
2.9.4+dfsg1-4ubuntu1.2
Ubuntu 17.04
-
libxml2
-
2.9.4+dfsg1-2.2ubuntu0.3
-
libxml2-utils
-
2.9.4+dfsg1-2.2ubuntu0.3
-
python-libxml2
-
2.9.4+dfsg1-2.2ubuntu0.3
-
python3-libxml2
-
2.9.4+dfsg1-2.2ubuntu0.3
Ubuntu 16.04
-
libxml2
-
2.9.3+dfsg1-1ubuntu0.5
-
libxml2-utils
-
2.9.3+dfsg1-1ubuntu0.5
-
python-libxml2
-
2.9.3+dfsg1-1ubuntu0.5
Ubuntu 14.04
-
libxml2
-
2.9.1+dfsg1-3ubuntu4.12
-
libxml2-utils
-
2.9.1+dfsg1-3ubuntu4.12
-
python-libxml2
-
2.9.1+dfsg1-3ubuntu4.12
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-3513-2: libxml2-utils, libxml2, python-libxml2