From Mageia wiki
Jump to: navigation, search

MGASA-2012-0272

Date: September 15th, 2012
Affected releases: 2


Description:
Updated libxslt packages fix security vulnerabilities:

libxslt 1.1.26 and earlier does not properly manage memory, which might
allow remote attackers to cause a denial of service (application crash)
via a crafted XSLT expression that is not properly identified during
XPath navigation, related to (1) the xsltCompileLocationPathPattern
function in libxslt/pattern.c and (2) the xsltGenerateIdFunction
function in libxslt/functions.c (CVE-2012-2870).

A heap-based buffer overflow flaw was found in the way libxslt applied
templates to nodes selected by certain namespaces. An attacker could
use this flaw to create a malicious XSL file that, when used by an
application linked against libxslt to perform an XSL transformation,
could cause the application to crash or, possibly, execute arbitrary
code with the privileges of the user running the application
(CVE-2012-2871).


Updated Packages:
lib(64)xslt1-1.1.26-6.20120127.3.mga2
lib(46)xslt-devel-1.1.26-6.20120127.3.mga2
python-libxslt-1.1.26-6.20120127.3.mga2
xsltproc-1.1.26-6.20120127.3.mga2


References:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2870
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-2871
https://rhn.redhat.com/errata/RHSA-2012-1265.html
https://bugs.mageia.org/show_bug.cgi?id=7480