First published: Mon Jan 29 2024(Updated: )
It was discovered that TinyXML incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted XML file, a remote attacker could possibly use this issue to cause a denial of service.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libtinyxml2.6.2v5 | <2.6.2-6ubuntu0.23.10.1 | 2.6.2-6ubuntu0.23.10.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libtinyxml2.6.2v5 | <2.6.2-6ubuntu0.22.04.1 | 2.6.2-6ubuntu0.22.04.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libtinyxml2.6.2v5 | <2.6.2-4+deb10u2build0.20.04.1 | 2.6.2-4+deb10u2build0.20.04.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libtinyxml2.6.2v5 | <2.6.2-4ubuntu0.18.04.1~esm2 | 2.6.2-4ubuntu0.18.04.1~esm2 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libtinyxml2.6.2v5 | <2.6.2-3ubuntu0.1~esm2 | 2.6.2-3ubuntu0.1~esm2 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6612-1 is classified as a vulnerability that could lead to denial of service under certain circumstances.
To fix USN-6612-1, upgrade the affected package libtinyxml2.6.2v5 to a safe version as specified in the advisory.
Ubuntu versions 16.04, 18.04, 20.04, 22.04, and 23.10 are affected by USN-6612-1.
The vulnerability in USN-6612-1 is due to TinyXML incorrectly handling certain specially crafted XML inputs.
USN-6612-1 does not allow remote code execution, but it can cause a denial of service.