[USN-5638-1] Expat vulnerability
Severity
Medium
Affected Packages
5
CVEs
1
Expat could be made to crash or execute arbitrary code.
Rhodri James discovered that Expat incorrectly handled memory when
processing certain malformed XML files. An attacker could possibly
use this issue to cause a crash or execute arbitrary code.
Package | Affected Version |
---|---|
pkg:deb/ubuntu/libexpat1?distro=xenial | < 2.1.0-7ubuntu0.16.04.5+esm6 |
pkg:deb/ubuntu/libexpat1-dev?distro=xenial | < 2.1.0-7ubuntu0.16.04.5+esm6 |
pkg:deb/ubuntu/lib64expat1?distro=xenial | < 2.1.0-7ubuntu0.16.04.5+esm6 |
pkg:deb/ubuntu/lib64expat1-dev?distro=xenial | < 2.1.0-7ubuntu0.16.04.5+esm6 |
pkg:deb/ubuntu/expat?distro=xenial | < 2.1.0-7ubuntu0.16.04.5+esm6 |
- ID
- USN-5638-1
- Severity
- medium
- URL
- https://ubuntu.com/security/notices/USN-5638-1
- Published
-
2022-09-26T14:19:17
(2 years ago) - Modified
-
2022-09-26T14:19:17
(2 years ago) - Other Advisories
-
- ALAS-2022-1654
- ALAS2-2022-1877
- ALAS2-2022-1900
- ALPINE:CVE-2022-40674
- ALSA-2022:6838
- ALSA-2022:6878
- ALSA-2022:7020
- ALSA-2022:7023
- ALSA-2022:7024
- ALSA-2023:3068
- DSA-5236-1
- ELSA-2022-6834
- ELSA-2022-6838
- ELSA-2022-6878
- ELSA-2022-6997
- ELSA-2022-6998
- ELSA-2022-7020
- ELSA-2022-7023
- ELSA-2022-7024
- ELSA-2022-7026
- ELSA-2022-9962
- ELSA-2022-9967
- FEDORA-2022-15ec504440
- FEDORA-2022-c22feb71ba
- FEDORA-2022-c68d90efc3
- FEDORA-2022-d93b3bd8b9
- FEDORA-2022-dcb1d7bcb1
- FREEBSD:0A0670A1-3E1A-11ED-B48B-E0D55E2A8BF9
- GLSA-202209-24
- GLSA-202211-06
- MFSA-2022-47
- MS:CVE-2022-40674
- RHSA-2022:6834
- RHSA-2022:6838
- RHSA-2022:6878
- RHSA-2022:6997
- RHSA-2022:6998
- RHSA-2022:7020
- RHSA-2022:7023
- RHSA-2022:7024
- RHSA-2022:7026
- RHSA-2023:3068
- RLSA-2022:6878
- RLSA-2022:7023
- RLSA-2022:7024
- SSA:2022-263-01
- SSA:2022-286-01
- SUSE-SU-2022:3466-1
- SUSE-SU-2022:3489-1
- SUSE-SU-2022:3597-1
- USN-5638-2
- USN-5638-4
- USN-5726-1
Type | Package URL | Namespace | Name / Product | Version | Distribution / Platform | Arch | Patch / Fix |
---|---|---|---|---|---|---|---|
Affected | pkg:deb/ubuntu/libexpat1?distro=xenial | ubuntu | libexpat1 | < 2.1.0-7ubuntu0.16.04.5+esm6 | xenial | ||
Affected | pkg:deb/ubuntu/libexpat1-dev?distro=xenial | ubuntu | libexpat1-dev | < 2.1.0-7ubuntu0.16.04.5+esm6 | xenial | ||
Affected | pkg:deb/ubuntu/lib64expat1?distro=xenial | ubuntu | lib64expat1 | < 2.1.0-7ubuntu0.16.04.5+esm6 | xenial | ||
Affected | pkg:deb/ubuntu/lib64expat1-dev?distro=xenial | ubuntu | lib64expat1-dev | < 2.1.0-7ubuntu0.16.04.5+esm6 | xenial | ||
Affected | pkg:deb/ubuntu/expat?distro=xenial | ubuntu | expat | < 2.1.0-7ubuntu0.16.04.5+esm6 | xenial |
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | Exploits | PoC | Pubblication Date | Modification Date |
---|---|---|---|---|---|---|---|---|---|---|---|
# CVE | Description | CVSS | EPSS | EPSS Trend (30 days) | Affected Products | Weaknesses | Security Advisories | PoC | Pubblication Date | Modification Date |