USN-6579-2: Xerces-C++ vulnerability
16 January 2024
Xerces-C++ could be made to crash or run programs if it opened a specially crafted file.
Releases
Packages
- xerces-c - Validating XML parser written in a portable subset of C++
Details
USN-6579-1 fixed a vulnerability in Xerces-C++. This update provides the
corresponding update for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04
and Ubuntu 23.10.
Original advisory details:
It was discovered that Xerces-C++ was not properly handling memory
management operations when parsing XML data containing external DTDs,
which could trigger a use-after-free error. If a user or automated system
were tricked into processing a specially crafted XML document, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code.
Update instructions
The problem can be corrected by updating your system to the following package versions:
Ubuntu 23.10
Ubuntu 23.04
Ubuntu 22.04
-
libxerces-c-samples
-
3.2.3+debian-3ubuntu0.1~esm1
Available with Ubuntu Pro
-
libxerces-c3.2
-
3.2.3+debian-3ubuntu0.1~esm1
Available with Ubuntu Pro
Ubuntu 20.04
In general, a standard system update will make all the necessary changes.
References
Related notices
- USN-6579-1: libxerces-c3.1, libxerces-c3.2, xerces-c, libxerces-c-samples, libxerces-c-doc, libxerces-c-dev
- USN-6590-1: libxerces-c3.1, libxerces-c3.2, xerces-c, libxerces-c-samples, libxerces-c-doc, libxerces-c-dev