Login
Newsletter
Werbung

Sicherheit: Denial of Service in xmltok
Aktuelle Meldungen Distributionen
Name: Denial of Service in xmltok
ID: USN-7307-1
Distribution: Ubuntu
Plattformen: Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 24.04 LTS, Ubuntu 24.10
Datum: Do, 27. Februar 2025, 07:00
Referenzen: https://www.cve.org/CVERecord?id=CVE-2012-1148
Applikationen: xmltok

Originalnachricht

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--===============4273833903426374641==
Content-Language: en-US
Content-Type: multipart/signed; micalg=pgp-sha256;
protocol="application/pgp-signature";
boundary="------------4zbWnbE2jE8KHPCQibfLJCRW"

This is an OpenPGP/MIME signed message (RFC 4880 and 3156)
--------------4zbWnbE2jE8KHPCQibfLJCRW
Content-Type: multipart/mixed;
boundary="------------Zl018aB20tbztwgsCAXhtTzR";
protected-headers="v1"
From: Bruce Cable <bruce.cable@canonical.com>
Reply-To: Ubuntu Security <security@ubuntu.com>
To: ubuntu-security-announce@lists.ubuntu.com
Message-ID: <59cf47ef-10ce-4d40-9eb7-01b07afdf15c@canonical.com>
Subject: [USN-7307-1] xmltok library vulnerability

--------------Zl018aB20tbztwgsCAXhtTzR
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: base64

==========================================================================
Ubuntu Security Notice USN-7307-1
February 26, 2025

libxmltok vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS

Summary:

Libxmltok could be made to crash if it opened a specially crafted
file.

Software Description:
- libxmltok: XML Parser Toolkit, developer libraries

Details:

Tim Boddy discovered that Expat, contained within the xmltok library, did
not properly handle memory reallocation when processing XML files. If a
user or application linked against Expat were tricked into opening a
crafted XML file, an attacker could cause a denial of service by consuming
excessive memory resources.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 24.10
  libxmltok1t64                   1.2-4.1ubuntu3.2

Ubuntu 24.04 LTS
  libxmltok1t64                   1.2-4.1ubuntu2.24.0.4.1+esm3
                                  Available with Ubuntu Pro

Ubuntu 22.04 LTS
  libxmltok1                      1.2-4ubuntu0.22.04.1~esm5
                                  Available with Ubuntu Pro

Ubuntu 20.04 LTS
  libxmltok1                      1.2-4ubuntu0.20.04.1~esm5
                                  Available with Ubuntu Pro

Ubuntu 18.04 LTS
  libxmltok1                      1.2-4ubuntu0.18.04.1~esm5
                                  Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
  https://ubuntu.com/security/notices/USN-7307-1
  CVE-2012-1148

Package Information:
  https://launchpad.net/ubuntu/+source/libxmltok/1.2-4.1ubuntu3.2

--------------Zl018aB20tbztwgsCAXhtTzR--

--------------4zbWnbE2jE8KHPCQibfLJCRW
Content-Type: application/pgp-signature; name="OpenPGP_signature.asc"
Content-Description: OpenPGP digital signature
Content-Disposition: attachment; filename="OpenPGP_signature.asc"

-----BEGIN PGP SIGNATURE-----
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=A0rm
-----END PGP SIGNATURE-----

--------------4zbWnbE2jE8KHPCQibfLJCRW--


--===============4273833903426374641==
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

Cg==

--===============4273833903426374641==--
Pro-Linux
Pro-Linux @Facebook
Neue Nachrichten
Werbung