USN-6579-1 fixed a vulnerability in Xerces-C++. This update provides the corresponding update for Ubuntu 20.04 LTS, Ubuntu 22.04 LTS, Ubuntu 23.04 and Ubuntu 23.10.
Original advisory details:
It was discovered that Xerces-C++ was not properly handling memory management operations when parsing XML data containing external DTDs, which could trigger a use-after-free error. If a user or automated system were tricked into processing a specially crafted XML document, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code.
{ "availability": "No subscription required", "binaries": [ { "binary_name": "libxerces-c-dev", "binary_version": "3.2.2+debian-1ubuntu0.1" }, { "binary_name": "libxerces-c-doc", "binary_version": "3.2.2+debian-1ubuntu0.1" }, { "binary_name": "libxerces-c-samples", "binary_version": "3.2.2+debian-1ubuntu0.1" }, { "binary_name": "libxerces-c-samples-dbgsym", "binary_version": "3.2.2+debian-1ubuntu0.1" }, { "binary_name": "libxerces-c3.2", "binary_version": "3.2.2+debian-1ubuntu0.1" }, { "binary_name": "libxerces-c3.2-dbgsym", "binary_version": "3.2.2+debian-1ubuntu0.1" } ] }
{ "availability": "Available with Ubuntu Pro: https://ubuntu.com/pro", "binaries": [ { "binary_name": "libxerces-c-dev", "binary_version": "3.2.3+debian-3ubuntu0.1~esm1" }, { "binary_name": "libxerces-c-doc", "binary_version": "3.2.3+debian-3ubuntu0.1~esm1" }, { "binary_name": "libxerces-c-samples", "binary_version": "3.2.3+debian-3ubuntu0.1~esm1" }, { "binary_name": "libxerces-c-samples-dbgsym", "binary_version": "3.2.3+debian-3ubuntu0.1~esm1" }, { "binary_name": "libxerces-c3.2", "binary_version": "3.2.3+debian-3ubuntu0.1~esm1" }, { "binary_name": "libxerces-c3.2-dbgsym", "binary_version": "3.2.3+debian-3ubuntu0.1~esm1" } ] }