Zwei Probleme in libxml2
ID: | USN-1904-1 |
Distribution: | Ubuntu |
Plattformen: | Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, Ubuntu 12.10, Ubuntu 13.04 |
Datum: | Mo, 15. Juli 2013, 18:16 |
Referenzen: | http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0339
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-2877 |
Applikationen: | libxml2 |
Originalnachricht |
|
This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --===============3168466827365698096== Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="------------enig796BAE7A11B5F509F17BD2EF" This is an OpenPGP/MIME signed message (RFC 2440 and 3156) --------------enig796BAE7A11B5F509F17BD2EF Content-Type: text/plain; charset=UTF- Content-Transfer-Encoding: quoted-printable ========================================================================== Ubuntu Security Notice USN-1904-1 July 15, 2013 libxml2 vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 13.04 - Ubuntu 12.10 - Ubuntu 12.04 LTS - Ubuntu 10.04 LTS Summary: Several security issues were fixed in libxml2. Software Description: - libxml2: GNOME XML library Details: It was discovered that libxml2 would load XML external entities by default. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly obtain access to arbitrary files or cause resource consumption. This issue only affected Ubuntu 10.04 LTS, Ubuntu 12.04 LTS, and Ubuntu 12.10. (CVE-2013-0339) It was discovered that libxml2 incorrectly handled documents that end abruptly. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause libxml2 to crash, resulting in a denial of service. (CVE-2013-2877) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 13.04: libxml2 2.9.0+dfsg1-4ubuntu4.2 Ubuntu 12.10: libxml2 2.8.0+dfsg1-5ubuntu2.3 Ubuntu 12.04 LTS: libxml2 2.7.8.dfsg-5.1ubuntu4.5 Ubuntu 10.04 LTS: libxml2 2.7.6.dfsg-1ubuntu1.9 After a standard system update you need to reboot your computer to make all the necessary changes. References: http://www.ubuntu.com/usn/usn-1904-1 CVE-2013-0339, CVE-2013-2877 Package Information: https://launchpad.net/ubuntu/+source/libxml2/2.9.0+dfsg1-4ubuntu4.2 https://launchpad.net/ubuntu/+source/libxml2/2.8.0+dfsg1-5ubuntu2.3 https://launchpad.net/ubuntu/+source/libxml2/2.7.8.dfsg-5.1ubuntu4.5 https://launchpad.net/ubuntu/+source/libxml2/2.7.6.dfsg-1ubuntu1.9 --------------enig796BAE7A11B5F509F17BD2EF Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.12 (GNU/Linux) Comment: Using GnuPG with undefined - http://www.enigmail.net/ iQIcBAEBCgAGBQJR4/fkAAoJEGVp2FWnRL6TzbgP/jG4P2ZxSPqZfRRyVZb082s/ F1DQyCsbvoE6zr6o9WtP7frjJTNkAjcRBayUg2iOpQBSOCheZcd6rKC7yKeyxDLS zQ40JjQogbPIsB2jAshd6ptS3WT3b31DTYII+5L0+8KNtM2W4lLuqyIMoJCeGZjg LSJYUeNgX5yV0gzT7iwxAVaxIcmhKWSeJnUS9kRFOuUF4T3HqocMkZhVuqjY1cl0 pqSh07nV6/eLYiUJIrpdo7jZUhnKDw1tSxNYyzjCqrGMJX76gyrqhlTg7AHlwX+O dEaWYCWem3gRPlLHH3fYDSdf5pI6HC+z7zCve4Y6k8Xz+EW3vumECPA4di8WTvqA pVebOrTLjWfNvUOhOUepAOdrhJl35zyxOs+PFQMxMiKxRzTTg0O7vzRmhFk8qoKe qyFGc70UCS6y2031tiBrurfqxNZau247b1CL/FXDpNNjFNZlmEh/22nh4ch28yiE O0dOvXAdXEDQYzOlBZkw1sr7Tux1tLgUYaH7MmYrV6Y2ts92n7W2/YkdsLBGTfr9 O1SLjirVYPwAY3DyHM914Uaymw2kjoMqtcF/H+r6eLMPb9DWFPj4DlcgfwBEW4XM UeZTepjhGbiE3fFMMVC51oLqy5yvzaACxCvcXT5VQTy3+v7OaXNobFw6iTLxNct0 IQ+pbMalnlt61xYe8wtV =MXtX -----END PGP SIGNATURE----- --------------enig796BAE7A11B5F509F17BD2EF-- --===============3168466827365698096== Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit Content-Disposition: inline -- ubuntu-security-announce mailing list ubuntu-security-announce@lists.ubuntu.com Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce --===============3168466827365698096==-- |