libxml2 vulnerability

Related Vulnerabilities: CVE-2014-0191  

libxml2 could be made to consume resources if it processed a specially crafted file.

Daniel Berrange discovered that libxml2 would incorrectly perform entity substitution even when requested not to. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause resource consumption, resulting in a denial of service.

15 May 2014

libxml2 vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 14.04 LTS
  • Ubuntu 13.10
  • Ubuntu 12.10
  • Ubuntu 12.04 LTS
  • Ubuntu 10.04 LTS

Summary

libxml2 could be made to consume resources if it processed a specially crafted file.

Software Description

  • libxml2 - GNOME XML library

Details

Daniel Berrange discovered that libxml2 would incorrectly perform entity substitution even when requested not to. If a user or automated system were tricked into opening a specially crafted document, an attacker could possibly cause resource consumption, resulting in a denial of service.

Update instructions

The problem can be corrected by updating your system to the following package versions:

Ubuntu 14.04 LTS
libxml2 - 2.9.1+dfsg1-3ubuntu4.1
Ubuntu 13.10
libxml2 - 2.9.1+dfsg1-3ubuntu2.1
Ubuntu 12.10
libxml2 - 2.8.0+dfsg1-5ubuntu2.5
Ubuntu 12.04 LTS
libxml2 - 2.7.8.dfsg-5.1ubuntu4.7
Ubuntu 10.04 LTS
libxml2 - 2.7.6.dfsg-1ubuntu1.11

To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to reboot your computer to make all the necessary changes.

References