Tuesday, February 25, 2025

[USN-7302-1] libxml2 vulnerabilities

-----BEGIN PGP SIGNATURE-----
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=7OzU
-----END PGP SIGNATURE-----
==========================================================================
Ubuntu Security Notice USN-7302-1
February 25, 2025

libxml2 vulnerabilities
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS

Summary:

Several security issues were fixed in libxml2.

Software Description:
- libxml2: GNOME XML library

Details:

It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could use this issue to cause libxml2 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS. (CVE-2022-49043)

It was discovered that the libxml2 xmllint tool incorrectly handled
certain memory operations. If a user or automated system were tricked into
running xmllint on a specially crafted xml file, a remote attacker could
cause xmllint to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2024-34459)

It was discovered that libxml2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-56171)

It was discovered that libxml2 could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2025-24928)

It was discovered that libxml2 could be made to dereference invalid memory.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2025-27113)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  libxml2                         2.12.7+dfsg-3ubuntu0.2

Ubuntu 24.04 LTS
  libxml2                         2.9.14+dfsg-1.3ubuntu3.2

Ubuntu 22.04 LTS
  libxml2                         2.9.13+dfsg-1ubuntu0.6

Ubuntu 20.04 LTS
  libxml2                         2.9.10+dfsg-5ubuntu0.20.04.9

Ubuntu 18.04 LTS
  libxml2                         2.9.4+dfsg1-6.1ubuntu1.9+esm2
                                  Available with Ubuntu Pro

Ubuntu 16.04 LTS
  libxml2                         2.9.3+dfsg1-1ubuntu0.7+esm7
                                  Available with Ubuntu Pro

Ubuntu 14.04 LTS
  libxml2                         2.9.1+dfsg1-3ubuntu4.13+esm7
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7302-1
  CVE-2022-49043, CVE-2024-34459, CVE-2024-56171, CVE-2025-24928,
  CVE-2025-27113

Package Information:
https://launchpad.net/ubuntu/+source/libxml2/2.12.7+dfsg-3ubuntu0.2
https://launchpad.net/ubuntu/+source/libxml2/2.9.14+dfsg-1.3ubuntu3.2
https://launchpad.net/ubuntu/+source/libxml2/2.9.13+dfsg-1ubuntu0.6
https://launchpad.net/ubuntu/+source/libxml2/2.9.10+dfsg-5ubuntu0.20.04.9

No comments:

Post a Comment