Preisgabe von Informationen in libxml-libxml-perl
ID: | USN-2592-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 12.04 LTS, Ubuntu 14.04 LTS, Ubuntu 14.10, Ubuntu 15.04 |
Datum: | Mo, 4. Mai 2015, 20:32 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-3451
https://launchpad.net/ubuntu/+source/libxml-libxml-perl/2.0116+dfsg-1ubuntu0.14.10.1 https://launchpad.net/ubuntu/+source/libxml-libxml-perl/2.0116+dfsg-1ubuntu0.15.04.1 |
Applikationen: | libxml-libxml-perl |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============2151252402446131001== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="FHnVxNQK4McCFtDM2OQc1xgx4GpEAMAt6" This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --FHnVxNQK4McCFtDM2OQc1xgx4GpEAMAt6 Content-Type: text/plain; charset=utf- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-2592-1 May 04, 2015 libxml-libxml-perl vulnerability ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 15.04 - Ubuntu 14.10 - Ubuntu 14.04 LTS - Ubuntu 12.04 LTS Summary: XML::LibXML could be made to expose sensitive information. Software Description: - libxml-libxml-perl: Perl interface to the libxml2 library Details: Tilmann Haak discovered that XML::LibXML incorrectly handled the expand_entities parameter in certain situations. A remote attacker could possibly use this issue to access sensitive information. Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 15.04: libxml-libxml-perl 2.0116+dfsg-1ubuntu0.15.04.1 Ubuntu 14.10: libxml-libxml-perl 2.0116+dfsg-1ubuntu0.14.10.1 Ubuntu 14.04 LTS: libxml-libxml-perl 2.0108+dfsg-1ubuntu0.1 Ubuntu 12.04 LTS: libxml-libxml-perl 1.89+dfsg-1ubuntu0.1 In general, a standard system update will make all the necessary changes. References: http://www.ubuntu.com/usn/usn-2592-1 CVE-2015-3451 Package Information: https://launchpad.net/ubuntu/+source/libxml-libxml-perl/2.0116+dfsg-1ubuntu0.15.04.1 https://launchpad.net/ubuntu/+source/libxml-libxml-perl/2.0116+dfsg-1ubuntu0.14.10.1 https://launchpad.net/ubuntu/+source/libxml-libxml-perl/2.0108+dfsg-1ubuntu0.1 https://launchpad.net/ubuntu/+source/libxml-libxml-perl/1.89+dfsg-1ubuntu0.1 --FHnVxNQK4McCFtDM2OQc1xgx4GpEAMAt6 Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIcBAEBCgAGBQJVR6dRAAoJEGVp2FWnRL6TeQYP/3AGzOalbZjZhAxtgds9ExbH wxyp6M2uugA2+r8jFkaq8b84IIGQG8T1QMmUADdjRRKfYZ07K3Bp/X5pXzXJGQmN 6pVAo0t45HNJqyyfcnEPO/AK1cOsDe9+nVWbfpQZb0qJRPAUOx8pbYEuxVX0aNJ5 DJfWPO5FlGhv0yIMPF+LtotQr7wKl7GlEwpDCZlSbEIcKHDat/SjQV2pXvunF6Oj xkv7LLEAHOaCipbafyZG4mFXohezSw0r1hHk9G48d49tZOQ97sd222xSpXfiFREe p+nwzFOvXEoVubBTeXP4Kg5/Figd9HxBAR8Byf1wWdnBbokAOXvD6xvRiTbAkels 85iUxLzACK0/ojHXOc72YOMG0NRz64MYdOdX+FgA1CkRVZOE2br6yTmrQxsHp/zC u91aTt8At/WH8Dx7CZEMGd26ABqUT7fN6DZd/dGVA6mCAiwYAx0Ty07Y/9Xtm7/c +FU50kduSVk9Midxb/SAyzwyvf9KfneL7PjWASCpie6hw/DU/iwwexiKRLiDrCKA ti5c/B7GcXwougdAqz/IntqL4PkqZjuRNl3F0oGv0SF17e9MdTOaz2oNhHBLKFLZ yzQklWRkJfFityGjfsBjtu9YYR1zm3K1ababXVcnbulGMBy+a0pUw/Gf6Gn/fVYe 4Pxj9r15gGafu67Fsd3z =zM7O -----END PGP SIGNATURE----- --FHnVxNQK4McCFtDM2OQc1xgx4GpEAMAt6-- --===============2151252402446131001== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============2151252402446131001==-- |