[USN-3739-2] libxml2 vulnerabilities


–===============0292985103103203332==
Content-Type: multipart/signed; micalg=”pgp-sha256″;
protocol=”application/pgp-signature”; boundary=”=-FdGavIsf0Fx4idQ64zSE”

–=-FdGavIsf0Fx4idQ64zSE
Content-Type: text/plain; charset=”UTF-8″
Content-Transfer-Encoding: quoted-printable

=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
Ubuntu Security Notice USN-3739-2
August 14, 2018

libxml2 vulnerabilities
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 12.04 ESM

Summary:

Several security issues were fixed in libxml2.

Software Description:
– libxml2: GNOME XML library

Details:

USN-3739-1 fixed a vulnerability in libxml2. This update provides
the corresponding update for Ubuntu 12.04.

Original advisory details:

=C2=A0Matias Brutti discovered that libxml2 incorrectly handled certain XML
=C2=A0files. An attacker could possibly use this issue to expose sensitive
=C2=A0information. (CVE-2016-9318)

=C2=A0It was discovered that libxml2 incorrectly handled certain files.
=C2=A0An attacker could possibly use this issue to cause a denial of
=C2=A0service. (CVE-2018-14404)

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 12.04 ESM:
=C2=A0 libxml2=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=
=A0=C2=A0=C2=A02.7.8.dfsg-5.1ubuntu4.21
=C2=A0 libxml2-utils=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.7.8.dfsg-5.1u=
buntu4.21
=C2=A0 python-libxml2=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=
=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A0=C2=A02.7.8.dfsg-5.1ubuntu4=
.21

In general, a standard system update will make all the necessary
changes.

References:
=C2=A0 https://usn.ubuntu.com/usn/usn-3739-2
=C2=A0 https://usn.ubuntu.com/usn/usn-3739-1
=C2=A0 CVE-2016-9318, CVE-2018-14404
–=-FdGavIsf0Fx4idQ64zSE
Content-Type: application/pgp-signature; name=”signature.asc”
Content-Description: This is a digitally signed message part
Content-Transfer-Encoding: 7bit

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v2
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=v/4y
—–END PGP SIGNATURE—–

–=-FdGavIsf0Fx4idQ64zSE–

–===============0292985103103203332==
Content-Type: text/plain; charset=”utf-8″
MIME-Version: 1.0
Content-Transfer-Encoding: base64
Content-Disposition: inline

LS0gCnVidW50dS1zZWN1cml0eS1hbm5vdW5jZSBtYWlsaW5nIGxpc3QKdWJ1bnR1LXNlY3VyaXR5
LWFubm91bmNlQGxpc3RzLnVidW50dS5jb20KTW9kaWZ5IHNldHRpbmdzIG9yIHVuc3Vic2NyaWJl
IGF0OiBodHRwczovL2xpc3RzLnVidW50dS5jb20vbWFpbG1hbi9saXN0aW5mby91YnVudHUtc2Vj
dXJpdHktYW5ub3VuY2UK

–===============0292985103103203332==–