First published: Thu Mar 20 2025(Updated: )
Ivan Fratric discovered that Libxslt incorrectly handled certain memory operations when handling documents. A remote attacker could use this issue to cause Libxslt to crash, resulting in a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libxslt1.1 | <1.1.39-0exp1ubuntu1.2 | 1.1.39-0exp1ubuntu1.2 |
Ubuntu | =24.10 | |
All of | ||
ubuntu/libxslt1.1 | <1.1.39-0exp1ubuntu0.24.04.2 | 1.1.39-0exp1ubuntu0.24.04.2 |
Ubuntu | =24.04 | |
All of | ||
ubuntu/libxslt1.1 | <1.1.34-4ubuntu0.22.04.3 | 1.1.34-4ubuntu0.22.04.3 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libxslt1.1 | <1.1.34-4ubuntu0.20.04.3 | 1.1.34-4ubuntu0.20.04.3 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-7361-1 is critical due to potential denial of service and arbitrary code execution risks.
To fix USN-7361-1, update the libxslt1.1 package to the recommended version available for your Ubuntu release.
USN-7361-1 affects Ubuntu versions 20.04, 22.04, and 24.04.
The vulnerability in USN-7361-1 involves improper memory handling in Libxslt that can be exploited for crashes or arbitrary code execution.
Yes, a remote attacker could exploit the vulnerability in USN-7361-1 to cause a denial of service or execute arbitrary code.