Login
Newsletter
Werbung

Sicherheit: Zwei Probleme in libxml2 (Aktualisierung)
Aktuelle Meldungen Distributionen
Name: Zwei Probleme in libxml2 (Aktualisierung)
ID: USN-1904-2
Distribution: Ubuntu
Plattformen: Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04
Datum: Mi, 17. Juli 2013, 16:34
Referenzen: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877
Applikationen: libxml2
Update von: Zwei Probleme in libxml2

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--===============0256929995213528972==
Content-Type: multipart/signed; micalg=pgp-sha512;
protocol="application/pgp-signature";
boundary="------------enig3E9268FE06C7453F25D5BA32"

This is an OpenPGP/MIME signed message (RFC 2440 and 3156)
--------------enig3E9268FE06C7453F25D5BA32
Content-Type: text/plain; charset=UTF-
Content-Transfer-Encoding: quoted-printable

==========================================================================
Ubuntu Security Notice USN-1904-2
July 17, 2013

libxml2 regression
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 13.04
- Ubuntu 12.10
- Ubuntu 12.04 LTS
- Ubuntu 10.04 LTS

Summary:

USN-1904-1 introduced a regression in libxml2.

Software Description:
- libxml2: GNOME XML library

Details:

USN-1904-1 fixed vulnerabilities in libxml2. The update caused a regression
for certain users. This update fixes the problem.

We apologize for the inconvenience.

Original advisory details:

It was discovered that libxml2 would load XML external entities by default.
If a user or automated system were tricked into opening a specially crafted
document, an attacker could possibly obtain access to arbitrary files or
cause resource consumption. This issue only affected Ubuntu 10.04 LTS,
Ubuntu 12.04 LTS, and Ubuntu 12.10. (CVE-2013-0339)

It was discovered that libxml2 incorrectly handled documents that end
abruptly. If a user or automated system were tricked into opening a
specially crafted document, an attacker could possibly cause libxml2 to
crash, resulting in a denial of service. (CVE-2013-2877)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.04:
libxml2 2.9.0+dfsg1-4ubuntu4.3

Ubuntu 12.10:
libxml2 2.8.0+dfsg1-5ubuntu2.4

Ubuntu 12.04 LTS:
libxml2 2.7.8.dfsg-5.1ubuntu4.6

Ubuntu 10.04 LTS:
libxml2 2.7.6.dfsg-1ubuntu1.10

After a standard system update you need to reboot your computer to make
all the necessary changes.

References:
http://www.ubuntu.com/usn/usn-1904-2
http://www.ubuntu.com/usn/usn-1904-1
https://launchpad.net/bugs/1201849

Package Information:
https://launchpad.net/ubuntu/+source/libxml2/2.9.0+dfsg1-4ubuntu4.3
https://launchpad.net/ubuntu/+source/libxml2/2.8.0+dfsg1-5ubuntu2.4
https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-5.1ubuntu4.6
https://launchpad.net/ubuntu/+source/libxml2/2.7.6.dfsg-1ubuntu1.10



--------------enig3E9268FE06C7453F25D5BA32
Content-Type: application/pgp-signature; name="signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="signature.asc"

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.12 (GNU/Linux)
Comment: Using GnuPG with undefined - http://www.enigmail.net/

iQIcBAEBCgAGBQJR5pkiAAoJEGVp2FWnRL6T3QMP/j0Q2WZNl5+puMraz3d+FPCF
Yfsk8zp+7GzzGw1aAC+g9yOUoy+yBSO6S8+TLuchExEXl/ZrZWpRjDIEqnPn6E9r
pfqb7M+J82XduJPKkPZ646RE9yv/CKiww0mTKRD1WEkTW/J7BNb9mGuo6Gpi5sIi
76J38zGtEeWDRGVaac+79vffLctGMoj8mllFanntGRYK5zyAjmMd6TmPirPqri/E
2fYvg37x2+UFo5QLhSOCx1f9xLUKVFly5N7bg76jxC/E68l02JGJG+8MJjM2hkKC
ZzyjJU1e2Y/Lf4CRcUvjnQIud0mYwfBsRMUPoDKqH4Hcfd0TufXNHqH0yGQg3U3y
8KEB6of8mJ1ewf/q2QAs4jIo2d2MS+4EkyhXzFBCOcm/J4Cg7GjX7Wr+w2V5EpqG
Qml5quuAi4/ZN8AGf+jKNnzlhKO3iNQhQSstZfNAWX3h1e8L8OwuE6io6RDp5ISx
oBFnTteLJyPn1enGVlklUbYE+TBJQsyrDUWDuhUbg56pgoSfAxC9qBkG4n1GgjSM
8sBqFiu+k01Dof0WiCZ7u5Rx+pLVDogD39SZEVPXb5Zo1zgKa3HLIV5QbJ7EZb/B
k1Z3hrXmFz9qB4AiqegOg6KOIEHwyo6eG1wN13atRi51PIjRoaTbJOm6mRIGdRrJ
KSnuFhwY0v9yLG9rrITh
=tIW+
-----END PGP SIGNATURE-----

--------------enig3E9268FE06C7453F25D5BA32--


--===============0256929995213528972==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce

--===============0256929995213528972==--
Pro-Linux
Gewinnspiel
Neue Nachrichten
Werbung