UBUNTU-CVE-2017-5969

Source
https://ubuntu.com/security/CVE-2017-5969
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-5969.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2017-5969
Related
Published
2017-04-11T16:59:00Z
Modified
2017-04-11T16:59:00Z
Severity
  • 4.7 (Medium) CVSS_V3 - CVSS:3.0/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H CVSS Calculator
Summary
[none]
Details

* DISPUTED * libxml2 2.9.4, when used in recover mode, allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted XML document. NOTE: The maintainer states "I would disagree of a CVE with the Recover parsing option which should only be used for manual recovery at least for XML parser."

References

Affected packages

Ubuntu:Pro:14.04:LTS / libxml2

Package

Name
libxml2
Purl
pkg:deb/ubuntu/libxml2?arch=src?distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.9.1+dfsg1-3ubuntu2
2.9.1+dfsg1-3ubuntu3
2.9.1+dfsg1-3ubuntu4
2.9.1+dfsg1-3ubuntu4.1
2.9.1+dfsg1-3ubuntu4.2
2.9.1+dfsg1-3ubuntu4.3
2.9.1+dfsg1-3ubuntu4.4
2.9.1+dfsg1-3ubuntu4.5
2.9.1+dfsg1-3ubuntu4.6
2.9.1+dfsg1-3ubuntu4.7
2.9.1+dfsg1-3ubuntu4.8
2.9.1+dfsg1-3ubuntu4.9
2.9.1+dfsg1-3ubuntu4.10
2.9.1+dfsg1-3ubuntu4.11
2.9.1+dfsg1-3ubuntu4.12
2.9.1+dfsg1-3ubuntu4.13
2.9.1+dfsg1-3ubuntu4.13+esm1
2.9.1+dfsg1-3ubuntu4.13+esm2
2.9.1+dfsg1-3ubuntu4.13+esm3
2.9.1+dfsg1-3ubuntu4.13+esm4
2.9.1+dfsg1-3ubuntu4.13+esm5
2.9.1+dfsg1-3ubuntu4.13+esm6

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}

Ubuntu:Pro:16.04:LTS / libxml2

Package

Name
libxml2
Purl
pkg:deb/ubuntu/libxml2?arch=src?distro=esm-infra/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.9.2+zdfsg1-4
2.9.2+zdfsg1-4ubuntu1
2.9.2+zdfsg1-4ubuntu2
2.9.2+zdfsg1-4ubuntu3
2.9.3+dfsg1-1
2.9.3+dfsg1-1ubuntu0.1
2.9.3+dfsg1-1ubuntu0.2
2.9.3+dfsg1-1ubuntu0.3
2.9.3+dfsg1-1ubuntu0.4
2.9.3+dfsg1-1ubuntu0.5
2.9.3+dfsg1-1ubuntu0.6
2.9.3+dfsg1-1ubuntu0.7
2.9.3+dfsg1-1ubuntu0.7+esm1
2.9.3+dfsg1-1ubuntu0.7+esm2
2.9.3+dfsg1-1ubuntu0.7+esm3
2.9.3+dfsg1-1ubuntu0.7+esm4
2.9.3+dfsg1-1ubuntu0.7+esm5
2.9.3+dfsg1-1ubuntu0.7+esm6

Ecosystem specific

{
    "ubuntu_priority": "negligible"
}