USN-569-1: libxml2 vulnerability

Publication date

14 January 2008

Overview

libxml2 vulnerability


Packages

Details

Brad Fitzpatrick discovered that libxml2 did not correctly handle certain
UTF-8 sequences. If a remote attacker were able to trick a user or
automated system into processing a specially crafted XML document, the
application linked against libxml2 could enter an infinite loop, leading
to a denial of service via CPU resource consumption.

Brad Fitzpatrick discovered that libxml2 did not correctly handle certain
UTF-8 sequences. If a remote attacker were able to trick a user or
automated system into processing a specially crafted XML document, the
application linked against libxml2 could enter an infinite loop, leading
to a denial of service via CPU resource consumption.

Update instructions

After a standard system upgrade you need to restart your session to effect the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
7.10 gutsy libxml2 –  2.6.30.dfsg-2ubuntu1.1
7.04 feisty libxml2 –  2.6.27.dfsg-1ubuntu3.1
6.10 edgy libxml2 –  2.6.26.dfsg-2ubuntu4.1
6.06 dapper libxml2 –  2.6.24.dfsg-1ubuntu1.1

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›