USN-6590-1: Xerces-C++ vulnerabilities
18 January 2024
Several security issues were fixed in Xerces-C++.
Releases
Packages
- xerces-c - Validating XML parser written in a portable subset of C++
Details
It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. This issue only affected Ubuntu 22.04 LTS. (CVE-2018-1311)
It was discovered that Xerces-C++ was not properly performing bounds
checks when processing XML Schema Definition files, which could lead to an
out-of-bounds access via an HTTP request. If a user or automated system
were tricked into processing a specially crafted XSD file, a remote
attacker could possibly use this issue to cause a denial of service.
(CVE-2023-37536)
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 22.04
Ubuntu 20.04
Ubuntu 18.04
-
libxerces-c-samples
-
3.2.0+debian-2ubuntu0.1~esm3
Available with Ubuntu Pro
-
libxerces-c3.2
-
3.2.0+debian-2ubuntu0.1~esm3
Available with Ubuntu Pro
Ubuntu 16.04
-
libxerces-c-samples
-
3.1.3+debian-1ubuntu0.1~esm3
Available with Ubuntu Pro
-
libxerces-c3.1
-
3.1.3+debian-1ubuntu0.1~esm3
Available with Ubuntu Pro
Ubuntu 14.04
-
libxerces-c-samples
-
3.1.1-5.1+deb8u4ubuntu0.1~esm2
Available with Ubuntu Pro
-
libxerces-c3.1
-
3.1.1-5.1+deb8u4ubuntu0.1~esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6579-1: libxerces-c3.1, libxerces-c3.2, xerces-c, libxerces-c-dev, libxerces-c-samples, libxerces-c-doc
- USN-6579-2: libxerces-c3.2, xerces-c, libxerces-c-dev, libxerces-c-samples, libxerces-c-doc