First published: Wed Mar 19 2025(Updated: )
Ivan Fratric discovered that Libxslt incorrectly handled certain memory operations when handling documents. A remote attacker could use this issue to cause Libxslt to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libxslt1.1 | <1.1.39-0exp1ubuntu1.1 | 1.1.39-0exp1ubuntu1.1 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/libxslt1.1 | <1.1.39-0exp1ubuntu0.24.04.1 | 1.1.39-0exp1ubuntu0.24.04.1 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libxslt1.1 | <1.1.34-4ubuntu0.22.04.2 | 1.1.34-4ubuntu0.22.04.2 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libxslt1.1 | <1.1.34-4ubuntu0.20.04.2 | 1.1.34-4ubuntu0.20.04.2 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7357-1 is critical due to the potential for denial of service or arbitrary code execution.
To fix USN-7357-1, update libxslt to the remedied version specified in the advisory for your affected Ubuntu release.
USN-7357-1 affects multiple versions of Ubuntu, including Ubuntu 22.04, 24.04, and 24.10 through the vulnerable libxslt package.
An attacker can exploit USN-7357-1 to crash the libxslt service or potentially execute arbitrary commands on the server.
USN-7357-1 was published on March 31, 2024, alerting users to the critical vulnerabilities.