You are here
Home > Preporuke > Sigurnosni nedostatak programskog paketa libxalan2-java

Sigurnosni nedostatak programskog paketa libxalan2-java

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LUB

==========================================================================
Ubuntu Security Notice USN-2218-1
May 21, 2014

libxalan2-java vulnerability
==========================================================================

A security issue affects these releases of Ubuntu and its derivatives:

– Ubuntu 13.10
– Ubuntu 12.04 LTS
– Ubuntu 10.04 LTS

Summary:

Xalan-Java could be made to load arbitrary classes or access external
resources.

Software Description:
– libxalan2-java: XSL Transformations (XSLT) processor in Java

Details:

Nicolas Gregoire discovered that Xalan-Java incorrectly handled certain
properties when the secure processing feature was enabled. An attacker
could possibly use this issue to load arbitrary classes or access external
resources.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 13.10:
libxalan2-java 2.7.1-8ubuntu0.1
libxsltc-java 2.7.1-8ubuntu0.1

Ubuntu 12.04 LTS:
libxalan2-java 2.7.1-7ubuntu0.1
libxsltc-java 2.7.1-7ubuntu0.1

Ubuntu 10.04 LTS:
libxalan2-java 2.7.1-5ubuntu1.1
libxalan2-java-gcj 2.7.1-5ubuntu1.1
libxsltc-java 2.7.1-5ubuntu1.1
libxsltc-java-gcj 2.7.1-5ubuntu1.1

After a standard system update you need to reboot your computer to make all
the necessary changes.

References:
http://www.ubuntu.com/usn/usn-2218-1
CVE-2014-0107

Package Information:
https://launchpad.net/ubuntu/+source/libxalan2-java/2.7.1-8ubuntu0.1
https://launchpad.net/ubuntu/+source/libxalan2-java/2.7.1-7ubuntu0.1
https://launchpad.net/ubuntu/+source/libxalan2-java/2.7.1-5ubuntu1.1

—–BEGIN PGP SIGNATURE—–
Version: GnuPG v1
Comment: Using GnuPG with Thunderbird – http://www.enigmail.net/

iQIcBAEBCgAGBQJTfP3jAAoJEGVp2FWnRL6TesgQAJtvjUzJPwNaEZrjJKDremTd
g2DWCxqmnOVDcHqyo+1n07QO8vD4BdFPePZDMBnC/CFVALXu8YRm/43VgIj90FXY
1JnL+6nm5l2XwGDIMhs24y3e0a7UmToR4kuHLPb6LcgQqo0gfeIVaqJ6jS7NvUXh
lGeedF+d8soEdyIg1Kpw6mDoEAESpg/NfuVkQC+QTHC6vGBaVQOSHiIQEu5l4hT6
qlea064XY5YXfvAw32OLaKsbMN304Lyh5jqeLc7eIeX2bv6qHTBEHMR5OUpJoe8b
/I6RsP6sCLPa1yLy1iDn7zpFg4uehpBuLFFbuXPSF5RjZVyX66k7MdbYkaa/ieQF
yiq7kZyW7l9XvJmWSijf6LMIxxBG2xWo+GAiqUQlA9aETvrl9ID7sxg3E0kb6m/q
4XtmAio6Ugbj6llf4LRJJCsmAywSG/lSKi3q8ogQzEHUUE4swmJP+FTKQKUjIZGW
ScLo8ClZVIPb6ElAXyjc6hhTfkzWlWghUZeM+jHomytn/QpG2H3J0xlhVlLyjkWl
HREkA7MYkJ+FajU41XjT6aKmfLipszPdQADhYcInBCPxPid8c7HjASe0y80NOaJG
Ac1JzIyYpvloeytmn7TGwdenj8AU5993WjVoIvSaE2k57fgYWdRI24yi3beJDXKd
gcsMWsKN1Smv0Y10mwyH
=FatM
—–END PGP SIGNATURE—–

AutorMarijo Plepelic
Cert idNCERT-REF-2014-05-0014-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco WAAS servisa

Otkrivena je ranjivost u softveru Cisco WAAS servisa kada je konfiguriran sa značajkom SharePoint. Ranjivost je uzrokovana neispravnim upravljanjem spremnika...

Close