drucken bookmarks versenden konfigurieren admin pdf Sicherheit: Denial of Service in xmltok
| Name: |
Denial of Service in xmltok |
|
| ID: |
USN-7307-1 |
|
| Distribution: |
Ubuntu |
|
| Plattformen: |
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10 |
|
| Datum: |
Do, 27. Februar 2025, 07:00 |
|
| Referenzen: |
https://www.cve.org/CVERecord?id=CVE-2012-1148 |
|
| Applikationen: |
xmltok |
|
Originalnachricht |
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --===============4273833903426374641== Content-Language: en-US Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="------------4zbWnbE2jE8KHPCQibfLJCRW"
This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --------------4zbWnbE2jE8KHPCQibfLJCRW Content-Type: multipart/mixed; boundary="------------Zl018aB20tbztwgsCAXhtTzR"; protected-headers="v1" From: Bruce Cable <bruce.cable@canonical.com> Reply-To: Ubuntu Security <security@ubuntu.com> To: ubuntu-security-announce@lists.ubuntu.com Message-ID: <59cf47ef-10ce-4d40-9eb7-01b07afdf15c@canonical.com> Subject: [USN-7307-1] xmltok library vulnerability
--------------Zl018aB20tbztwgsCAXhtTzR Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: base64
========================================================================== Ubuntu Security Notice USN-7307-1 February 26, 2025
libxmltok vulnerability ==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10 - Ubuntu 24.04 LTS - Ubuntu 22.04 LTS - Ubuntu 20.04 LTS - Ubuntu 18.04 LTS
Summary:
Libxmltok could be made to crash if it opened a specially crafted file.
Software Description: - libxmltok: XML Parser Toolkit, developer libraries
Details:
Tim Boddy discovered that Expat, contained within the xmltok library, did not properly handle memory reallocation when processing XML files. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service by consuming excessive memory resources.
Update instructions:
The problem can be corrected by updating your system to the following package versions:
Ubuntu 24.10 libxmltok1t64 1.2-4.1ubuntu3.2
Ubuntu 24.04 LTS libxmltok1t64 1.2-4.1ubuntu2.24.0.4.1+esm3 Available with Ubuntu Pro
Ubuntu 22.04 LTS libxmltok1 1.2-4ubuntu0.22.04.1~esm5 Available with Ubuntu Pro
Ubuntu 20.04 LTS libxmltok1 1.2-4ubuntu0.20.04.1~esm5 Available with Ubuntu Pro
Ubuntu 18.04 LTS libxmltok1 1.2-4ubuntu0.18.04.1~esm5 Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References: https://ubuntu.com/security/notices/USN-7307-1 CVE-2012-1148
Package Information: https://launchpad.net/ubuntu/+source/libxmltok/1.2-4.1ubuntu3.2
--------------Zl018aB20tbztwgsCAXhtTzR--
--------------4zbWnbE2jE8KHPCQibfLJCRW Content-Type: application/pgp-signature; name="OpenPGP_signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="OpenPGP_signature.asc"
-----BEGIN PGP SIGNATURE-----
wsD5BAABCAAjFiEEkd98mdFcnQdP7vQkuGrtzot7pOcFAme/x7UFAwAAAAAACgkQuGrtzot7pOc2 EgwAuGKilfxti9nvAtbFDvDPrcBK6sz/AvtwKvzhkZsQ6cHxJMUJv1oA1NO7XwBRZvDlQZwBESqH k8OWi44slohyhZVuyfUrX8AgVEZ4C7jQWWadMXNCpwjTk475tGtOT3uwU3FA7URT31cqdOEoMEFV VpNavExWaW8k/S8gqTw1SRmj2Eulsj0lFhaKqQLJ7ZZY46NKpISB9A+gzRkBK2dbnbT+cVI7yeh3 1KrBz7rIon4HOgZIhdLgmm4m2hNo5e40DuKCU2Bh87NW0cSKXTyAB9Na2qjU9KYVR+p6UEA16j5G 2Grxv36Uke6Wds20EyB7pxy+4rxV7mGpW5AJZpitsGqlKc1aw2DkRDvJ8t2yM0lP32XjxrzidLXZ 1nH3SdSys736gVxY626VJgdtTV9y7pgGtd6oUrRLSrvyq74vWqXo1LeL4jNzU75e/zhu8cCUeurz dvyydrR1yeYlkMTeV8kB++Qbkb3GucnZtRcjDzPku5snTyWpPKbLyrgYUEFc =A0rm -----END PGP SIGNATURE-----
--------------4zbWnbE2jE8KHPCQibfLJCRW--
--===============4273833903426374641== Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: base64 Content-Disposition: inline
Cg==
--===============4273833903426374641==--
|
|
|
|