libxslt, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted web site.
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "libxslt1-dbg" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "libxslt1-dev" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "libxslt1-dev-dbgsym" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "libxslt1.1" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "libxslt1.1-dbgsym" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "python-libxslt1" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "python-libxslt1-dbg" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "python-libxslt1-dbgsym" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "xsltproc" }, { "binary_version": "1.1.28-2ubuntu0.1", "binary_name": "xsltproc-dbgsym" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "medium", "binaries": [ { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "libxslt1-dbg" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "libxslt1-dev" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "libxslt1-dev-dbgsym" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "libxslt1.1" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "libxslt1.1-dbgsym" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "python-libxslt1" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "python-libxslt1-dbg" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "xsltproc" }, { "binary_version": "1.1.28-2.1ubuntu0.1", "binary_name": "xsltproc-dbgsym" } ] }