USN-7638-1: Libmobi vulnerabilities
Publication date
16 July 2025
Overview
Several security issues were fixed in Libmobi.
Releases
Packages
- libmobi - C library for handling Kindle (MOBI) formats of ebook documents
Details
It was discovered that Libmobi did not correctly handle certain memory
operations, which could lead to a buffer overflow. A local attacker
could possibly trigger this vulnerability to cause a denial of service.
(CVE-2022-1907, CVE-2022-1908)
It was discovered that Libmobi could dereference a NULL pointer via the
component mobi_buffer_getpointer. A local attacker could possibly
trigger this vulnerability to cause a denial of service.
(CVE-2022-29788)
It was discovered that Libmobi did not correctly handle certain memory
operations, which could lead to a buffer overflow. A local attacker
could possibly trigger this vulnerability to cause a denial of service.
(CVE-2022-1907, CVE-2022-1908)
It was discovered that Libmobi could dereference a NULL pointer via the
component mobi_buffer_getpointer. A local attacker could possibly
trigger this vulnerability to cause a denial of service.
(CVE-2022-29788)
Update instructions
In general, a standard system update will make all the necessary changes.
Learn more about how to get the fixes.The problem can be corrected by updating your system to the following package versions:
Ubuntu Release | Package Version | ||
---|---|---|---|
22.04 jammy | libmobi0 – 0.9+dfsg1-1ubuntu0.1~esm1 |
Reduce your security exposure
Ubuntu Pro provides ten-year security coverage to 25,000+ packages in Main and Universe repositories, and it is free for up to five machines.