USN-6579-1: Xerces-C++ vulnerability
11 January 2024
Xerces-C++ could be made to crash or run programs if it opened a specially crafted file.
Releases
Packages
- xerces-c - Validating XML parser written in a portable subset of C++
Details
It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 18.04
-
libxerces-c-samples
-
3.2.0+debian-2ubuntu0.1~esm2
Available with Ubuntu Pro
-
libxerces-c3.2
-
3.2.0+debian-2ubuntu0.1~esm2
Available with Ubuntu Pro
Ubuntu 16.04
-
libxerces-c-samples
-
3.1.3+debian-1ubuntu0.1~esm2
Available with Ubuntu Pro
-
libxerces-c3.1
-
3.1.3+debian-1ubuntu0.1~esm2
Available with Ubuntu Pro
Ubuntu 14.04
-
libxerces-c-samples
-
3.1.1-5.1+deb8u4ubuntu0.1~esm1
Available with Ubuntu Pro
-
libxerces-c3.1
-
3.1.1-5.1+deb8u4ubuntu0.1~esm1
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6579-2: xerces-c, libxerces-c-samples, libxerces-c-doc, libxerces-c3.2, libxerces-c-dev
- USN-6590-1: libxerces-c3.1, xerces-c, libxerces-c-samples, libxerces-c-doc, libxerces-c3.2, libxerces-c-dev