From Mageia wiki
Jump to: navigation, search

MGASA-2012-0271

Date: September 15th, 2012
Affected releases: 1


Description:
Updated libxslt packages fix security vulnerabilities:

An information leak could occur if an application using libxslt processed
an untrusted XPath expression, or used a malicious XSL file to perform an
XSL transformation. If combined with other flaws, this leak could possibly
help an attacker bypass intended memory corruption protections
(CVE-2011-1202).

libxslt 1.1.26 and earlier does not properly manage memory, which might
allow remote attackers to cause a denial of service (application crash)
via a crafted XSLT expression that is not properly identified during
XPath navigation, related to (1) the xsltCompileLocationPathPattern
function in libxslt/pattern.c and (2) the xsltGenerateIdFunction
function in libxslt/functions.c (CVE-2012-2870).

A heap-based buffer overflow flaw was found in the way libxslt applied
templates to nodes selected by certain namespaces. An attacker could
use this flaw to create a malicious XSL file that, when used by an
application linked against libxslt to perform an XSL transformation,
could cause the application to crash or, possibly, execute arbitrary
code with the privileges of the user running the application
(CVE-2012-2871).


Updated Packages:
lib(64)xslt1-1.1.26-5.3.mga1
lib(64)xslt-devel-1.1.26-5.3.mga1
python-libxslt-1.1.26-5.3.mga1
xsltproc-1.1.26-5.3.mga1


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1202
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2871
https://rhn.redhat.com/errata/RHSA-2012-1265.html
https://bugs.mageia.org/show_bug.cgi?id=7480