Ubuntu 3424-1: libxml2 vulnerabilities

    Date18 Sep 2017
    CategoryUbuntu
    60
    Posted ByLinuxSecurity Advisories
    Several security issues were fixed in libxml2.
    ==========================================================================
    Ubuntu Security Notice USN-3424-1
    September 19, 2017
    
    libxml2 vulnerabilities
    ==========================================================================
    
    A security issue affects these releases of Ubuntu and its derivatives:
    
    - Ubuntu 17.04
    - Ubuntu 16.04 LTS
    - Ubuntu 14.04 LTS
    
    Summary:
    
    Several security issues were fixed in libxml2.
    
    Software Description:
    - libxml2: GNOME XML library
    
    Details:
    
    It was discovered that a type confusion error existed in libxml2. An
    attacker could use this to specially construct XML data that
    could cause a denial of service or possibly execute arbitrary
    code. (CVE-2017-0663)
    
    It was discovered that libxml2 did not properly validate parsed entity
    references. An attacker could use this to specially construct XML
    data that could expose sensitive information. (CVE-2017-7375)
    
    It was discovered that a buffer overflow existed in libxml2 when
    handling HTTP redirects. An attacker could use this to specially
    construct XML data that could cause a denial of service or possibly
    execute arbitrary code. (CVE-2017-7376)
    
    Marcel Böhme and Van-Thuan Pham discovered a buffer overflow in
    libxml2 when handling elements. An attacker could use this to specially
    construct XML data that could cause a denial of service or possibly
    execute arbitrary code. (CVE-2017-9047)
    
    Marcel Böhme and Van-Thuan Pham discovered a buffer overread
    in libxml2 when handling elements. An attacker could use this
    to specially construct XML data that could cause a denial of
    service. (CVE-2017-9048)
    
    Marcel Böhme and Van-Thuan Pham discovered multiple buffer overreads
    in libxml2 when handling parameter-entity references. An attacker
    could use these to specially construct XML data that could cause a
    denial of service. (CVE-2017-9049, CVE-2017-9050)
    
    Update instructions:
    
    The problem can be corrected by updating your system to the following
    package versions:
    
    Ubuntu 17.04:
      libxml2                         2.9.4+dfsg1-2.2ubuntu0.1
    
    Ubuntu 16.04 LTS:
      libxml2                         2.9.3+dfsg1-1ubuntu0.3
    
    Ubuntu 14.04 LTS:
      libxml2                         2.9.1+dfsg1-3ubuntu4.10
    
    In general, a standard system update will make all the necessary changes.
    
    References:
      https://www.ubuntu.com/usn/usn-3424-1
      CVE-2017-0663, CVE-2017-7375, CVE-2017-7376, CVE-2017-9047,
      CVE-2017-9048, CVE-2017-9049, CVE-2017-9050
    
    Package Information:
      https://launchpad.net/ubuntu/+source/libxml2/2.9.4+dfsg1-2.2ubuntu0.1
      https://launchpad.net/ubuntu/+source/libxml2/2.9.3+dfsg1-1ubuntu0.3
      https://launchpad.net/ubuntu/+source/libxml2/2.9.1+dfsg1-3ubuntu4.10
    
    
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    /main-polls/24-what-do-you-think-of-the-quality-of-the-articles-on-linuxsecurity?task=poll.vote&format=json
    24
    radio
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"23","type":"x","order":"1","pct":53.49,"resources":[]},{"id":"88","title":"Should be more technical","votes":"5","type":"x","order":"2","pct":11.63,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"15","type":"x","order":"3","pct":34.88,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.