USN-7638-1: Libmobi vulnerabilities

Publication date

16 July 2025

Overview

Several security issues were fixed in Libmobi.

Releases


Packages

  • libmobi - C library for handling Kindle (MOBI) formats of ebook documents

Details

It was discovered that Libmobi did not correctly handle certain memory
operations, which could lead to a buffer overflow. A local attacker
could possibly trigger this vulnerability to cause a denial of service.
(CVE-2022-1907, CVE-2022-1908)

It was discovered that Libmobi could dereference a NULL pointer via the
component mobi_buffer_getpointer. A local attacker could possibly
trigger this vulnerability to cause a denial of service.
(CVE-2022-29788)

It was discovered that Libmobi did not correctly handle certain memory
operations, which could lead to a buffer overflow. A local attacker
could possibly trigger this vulnerability to cause a denial of service.
(CVE-2022-1907, CVE-2022-1908)

It was discovered that Libmobi could dereference a NULL pointer via the
component mobi_buffer_getpointer. A local attacker could possibly
trigger this vulnerability to cause a denial of service.
(CVE-2022-29788)

Update instructions

In general, a standard system update will make all the necessary changes.

Learn more about how to get the fixes.

The problem can be corrected by updating your system to the following package versions:

Ubuntu Release Package Version
22.04 jammy libmobi0 –  0.9+dfsg1-1ubuntu0.1~esm1  

Reduce your security exposure

Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.


Have additional questions?

Talk to a member of the team ›