[USN-7742-1] GnuTLS vulnerabilities
[USN-7743-1] libxml2 vulnerability
[USN-7739-1] Bind vulnerabilities
[USN-7742-1] GnuTLS vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7742-1
September 09, 2025
gnutls28 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
Summary:
Several security issues were fixed in GnuTLS.
Software Description:
- gnutls28: GNU TLS library
Details:
It was discovered that GnuTLS incorrectly handled exporting Subject
Alternative Name (SAN) entries containing an otherName. A remote attacker
could use this issue to cause GnuTLS to crash, resulting in a denial of
service, or possibly execute arbitrary code. This issue only affected
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2025-32988)
It was discovered that the GnuTLS certtool utility incorrectly handled
parsing certain template files. An attacker could use this issue to cause
GnuTLS to crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2025-32990)
Stefan Bühler discovered that GnuTLS incorrectly handled parsing certain
template files. An attacker could possibly use this issue to cause GnuTLS
to crash, resulting in a denial of service. This issue only affected
Ubuntu 20.04 LTS. (CVE-2025-6395)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 20.04 LTS
libgnutls30 3.6.13-2ubuntu1.12+esm1
Available with Ubuntu Pro
Ubuntu 18.04 LTS
libgnutls30 3.5.18-1ubuntu1.6+esm2
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libgnutls30 3.4.10-4ubuntu1.9+esm2
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7742-1
CVE-2025-32988, CVE-2025-32990, CVE-2025-6395
[USN-7743-1] libxml2 vulnerability
==========================================================================
Ubuntu Security Notice USN-7743-1
September 10, 2025
libxml2 vulnerability
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 25.04
- Ubuntu 24.04 LTS
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary:
libxml2 could be made to crash if it received specially crafted
input.
Software Description:
- libxml2: GNOME XML library
Details:
Nikita Sveshnikov discovered that libxml2 incorrectly handled recursion
when processing XPath expressions. An attacker could possibly use this
issue to cause a denial of service.
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 25.04
libxml2 2.12.7+dfsg+really2.9.14-0.4ubuntu0.3
libxml2-dev 2.12.7+dfsg+really2.9.14-0.4ubuntu0.3
libxml2-utils 2.12.7+dfsg+really2.9.14-0.4ubuntu0.3
Ubuntu 24.04 LTS
libxml2 2.9.14+dfsg-1.3ubuntu3.5
libxml2-dev 2.9.14+dfsg-1.3ubuntu3.5
libxml2-utils 2.9.14+dfsg-1.3ubuntu3.5
Ubuntu 22.04 LTS
libxml2 2.9.13+dfsg-1ubuntu0.9
libxml2-dev 2.9.13+dfsg-1ubuntu0.9
libxml2-utils 2.9.13+dfsg-1ubuntu0.9
Ubuntu 20.04 LTS
libxml2 2.9.10+dfsg-5ubuntu0.20.04.10+esm2
Available with Ubuntu Pro
libxml2-dev 2.9.10+dfsg-5ubuntu0.20.04.10+esm2
Available with Ubuntu Pro
libxml2-utils 2.9.10+dfsg-5ubuntu0.20.04.10+esm2
Available with Ubuntu Pro
Ubuntu 18.04 LTS
libxml2 2.9.4+dfsg1-6.1ubuntu1.9+esm5
Available with Ubuntu Pro
libxml2-dev 2.9.4+dfsg1-6.1ubuntu1.9+esm5
Available with Ubuntu Pro
libxml2-utils 2.9.4+dfsg1-6.1ubuntu1.9+esm5
Available with Ubuntu Pro
Ubuntu 16.04 LTS
libxml2 2.9.3+dfsg1-1ubuntu0.7+esm10
Available with Ubuntu Pro
libxml2-dev 2.9.3+dfsg1-1ubuntu0.7+esm10
Available with Ubuntu Pro
libxml2-utils 2.9.3+dfsg1-1ubuntu0.7+esm10
Available with Ubuntu Pro
Ubuntu 14.04 LTS
libxml2 2.9.1+dfsg1-3ubuntu4.13+esm9
Available with Ubuntu Pro
libxml2-dev 2.9.1+dfsg1-3ubuntu4.13+esm9
Available with Ubuntu Pro
libxml2-utils 2.9.1+dfsg1-3ubuntu4.13+esm9
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7743-1
CVE-2025-9714
Package Information:
https://launchpad.net/ubuntu/+source/libxml2/2.12.7+dfsg+really2.9.14-0.4ubuntu0.3
https://launchpad.net/ubuntu/+source/libxml2/2.9.14+dfsg-1.3ubuntu3.5
https://launchpad.net/ubuntu/+source/libxml2/2.9.13+dfsg-1ubuntu0.9
[USN-7739-1] Bind vulnerabilities
==========================================================================
Ubuntu Security Notice USN-7739-1
September 08, 2025
bind9 vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 14.04 LTS
Summary:
Several security issues were fixed in Bind.
Software Description:
- bind9: Internet Domain Name Server
Details:
Greg Kuechle discovered that Bind incorrectly handled certain incremental
zone updates. A remote attacker could possibly use this issue to cause Bind
to crash, resulting in a denial of service. (CVE-2021-25214)
Siva Kakarla discovered that Bind incorrectly handled certain DNAME
records. A remote attacker could possibly use this issue to cause Bind to
crash, resulting in a denial of service. (CVE-2021-25215)
It was discovered that Bind incorrectly handled GSSAPI security policy
negotiation. A remote attacker could use this issue to cause Bind to crash,
resulting in a denial of service, or possibly execute arbitrary code.
(CVE-2021-25216)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 14.04 LTS
bind9 1:9.9.5.dfsg-3ubuntu0.19+esm13
Available with Ubuntu Pro
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-7739-1
CVE-2021-25214, CVE-2021-25215, CVE-2021-25216