USN-3235-1: libxml2 vulnerabilities
16 March 2017
Several security issues were fixed in libxml2.
Releases
Packages
- libxml2 - GNOME XML library
Details
It was discovered that libxml2 incorrectly handled format strings. If a
user or automated system were tricked into opening a specially crafted
document, an attacker could possibly cause libxml2 to crash, resulting in a
denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04
LTS, and Ubuntu 16.04 LTS. (CVE-2016-4448)
It was discovered that libxml2 incorrectly handled certain malformed
documents. If a user or automated system were tricked into opening a
specially crafted document, an attacker could cause libxml2 to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2016-4658)
Nick Wellnhofer discovered that libxml2 incorrectly handled certain
malformed documents. If a user or automated system were tricked into
opening a specially crafted document, an attacker could cause libxml2 to
crash, resulting in a denial of service, or possibly execute arbitrary
code. (CVE-2016-5131)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 16.10
Ubuntu 16.04
Ubuntu 14.04
Ubuntu 12.04
After a standard system update you need to reboot your computer to make
all the necessary changes.
References
Related notices
- USN-3041-1: liboxideqtcore0, liboxideqt-qmlplugin, oxideqmlscene, oxideqt-chromedriver, oxideqt-codecs-extra, oxideqt-codecs, oxide-qt, liboxideqtcore-dev, liboxideqtquick-dev, liboxideqtquick0