Описание
ELSA-2008-0287: libxslt security update (IMPORTANT)
[1.1.17-2.0.1.el5_1.1]
- Added libxslt-enterprise.patch and replaced doc/redhat.gif
[1.1.17-2.el5_1.1]
- fix a max number of steps in pattern match expressions bug
- resolves: rhbz#446891
Обновленные пакеты
Oracle Linux 5
Oracle Linux x86_64
libxslt
1.1.17-2.0.1.el5_1.1
libxslt-devel
1.1.17-2.0.1.el5_1.1
libxslt-python
1.1.17-2.0.1.el5_1.1
Oracle Linux i386
libxslt
1.1.17-2.0.1.el5_1.1
libxslt-devel
1.1.17-2.0.1.el5_1.1
libxslt-python
1.1.17-2.0.1.el5_1.1
Связанные CVE
Связанные уязвимости
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-d ...
Buffer overflow in pattern.c in libxslt before 1.1.24 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via an XSL style sheet file with a long XSLT "transformation match" condition that triggers a large number of steps.