[USN-7302-1] libxml2 vulnerabilities
Fabian Toepfer
fabian.toepfer at canonical.com
Tue Feb 25 19:55:38 UTC 2025
==========================================================================
Ubuntu Security Notice USN-7302-1
February 25, 2025
libxml2 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 24.10
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in libxml2.
Software Description:
- libxml2: GNOME XML library
Details:
It was discovered that libxml2 incorrectly handled certain memory
operations. A remote attacker could use this issue to cause libxml2 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and
Ubuntu 18.04 LTS. (CVE-2022-49043)
It was discovered that the libxml2 xmllint tool incorrectly handled
certain memory operations. If a user or automated system were tricked into
running xmllint on a specially crafted xml file, a remote attacker could
cause xmllint to crash, resulting in a denial of service. This issue only
affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, and Ubuntu 18.04 LTS.
(CVE-2024-34459)
It was discovered that libxml2 did not properly manage memory. An attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-56171)
It was discovered that libxml2 could be made to write out of bounds. An
attacker could possibly use this issue to cause a denial of service or
execute arbitrary code. (CVE-2025-24928)
It was discovered that libxml2 could be made to dereference invalid memory.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2025-27113)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 24.10
libxml2 2.12.7+dfsg-3ubuntu0.2
Ubuntu 24.04 LTS
libxml2 2.9.14+dfsg-1.3ubuntu3.2
Ubuntu 22.04 LTS
libxml2 2.9.13+dfsg-1ubuntu0.6
Ubuntu 20.04 LTS
libxml2 2.9.10+dfsg-5ubuntu0.20.04.9
Ubuntu 18.04 LTS
libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libxml2 2.9.3+dfsg1-1ubuntu0.7+esm7
Available with Ubuntu Pro
Ubuntu 14.04 LTS
libxml2 2.9.1+dfsg1-3ubuntu4.13+esm7
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7302-1
CVE-2022-49043, CVE-2024-34459, CVE-2024-56171, CVE-2025-24928,
CVE-2025-27113
Package Information:
https://launchpad.net/ubuntu/+source/libxml2/2.12.7+dfsg-3ubuntu0.2
https://launchpad.net/ubuntu/+source/libxml2/2.9.14+dfsg-1.3ubuntu3.2
https://launchpad.net/ubuntu/+source/libxml2/2.9.13+dfsg-1ubuntu0.6
https://launchpad.net/ubuntu/+source/libxml2/2.9.10+dfsg-5ubuntu0.20.04.9
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <https://lists.ubuntu.com/archives/ubuntu-security-announce/attachments/20250225/2dc50af0/attachment.sig>
More information about the ubuntu-security-announce
mailing list