First published: Mon Aug 31 2015(Updated: )
It was discovered that Expat incorrectly handled malformed XML data. If a user or application linked against Expat were tricked into opening a crafted XML file, an attacker could cause a denial of service, or possibly execute arbitrary code.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/lib64expat1 | <2.1.0-6ubuntu1.1 | 2.1.0-6ubuntu1.1 |
=15.04 | ||
All of | ||
ubuntu/libexpat1 | <2.1.0-6ubuntu1.1 | 2.1.0-6ubuntu1.1 |
=15.04 | ||
All of | ||
ubuntu/lib64expat1 | <2.1.0-4ubuntu1.1 | 2.1.0-4ubuntu1.1 |
=14.04 | ||
All of | ||
ubuntu/libexpat1 | <2.1.0-4ubuntu1.1 | 2.1.0-4ubuntu1.1 |
=14.04 | ||
All of | ||
ubuntu/lib64expat1 | <2.0.1-7.2ubuntu1.2 | 2.0.1-7.2ubuntu1.2 |
=12.04 | ||
All of | ||
ubuntu/libexpat1 | <2.0.1-7.2ubuntu1.2 | 2.0.1-7.2ubuntu1.2 |
=12.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is USN-2726-1.
The title of this vulnerability is USN-2726-1: Expat vulnerability.
This vulnerability in Expat allows attackers to cause a denial of service or possibly execute arbitrary code.
The software affected by this vulnerability is Ubuntu 15.04, 14.04, 12.04.
The remedy for this vulnerability is to update to version 2.1.0-6ubuntu1.1 for libexpat1 and lib64expat1 packages.