Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

openSUSE-SU-2020:0731-1

Опубликовано: 28 мая 2020
Источник: suse-cvrf

Описание

Security update for libxslt

This update for libxslt fixes the following issues:

Security issues fixed:

  • CVE-2019-13118: Fixed a read of uninitialized stack data (bsc#1140101).
  • CVE-2019-13117: Fixed a uninitialized read which allowed to discern whether a byte on the stack contains certain special characters (bsc#1140095).
  • CVE-2019-18197: Fixed a dangling pointer in xsltCopyText which may have led to information disclosure (bsc#1154609).

This update was imported from the SUSE:SLE-15:Update update project.

Список пакетов

openSUSE Leap 15.1
libxslt-devel-1.1.32-lp151.3.6.1
libxslt-devel-32bit-1.1.32-lp151.3.6.1
libxslt-python-1.1.32-lp151.3.6.1
libxslt-tools-1.1.32-lp151.3.6.1
libxslt1-1.1.32-lp151.3.6.1
libxslt1-32bit-1.1.32-lp151.3.6.1

Описание

In numbers.c in libxslt 1.1.33, an xsl:number with certain format strings could lead to a uninitialized read in xsltNumberFormatInsertNumbers. This could allow an attacker to discern whether a byte on the stack contains the characters A, a, I, i, or 0, or any other character.


Затронутые продукты
openSUSE Leap 15.1:libxslt-devel-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-devel-32bit-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-python-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-tools-1.1.32-lp151.3.6.1

Ссылки

Описание

In numbers.c in libxslt 1.1.33, a type holding grouping characters of an xsl:number instruction was too narrow and an invalid character/length combination could be passed to xsltNumberFormatDecimal, leading to a read of uninitialized stack data.


Затронутые продукты
openSUSE Leap 15.1:libxslt-devel-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-devel-32bit-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-python-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-tools-1.1.32-lp151.3.6.1

Ссылки

Описание

In xsltCopyText in transform.c in libxslt 1.1.33, a pointer variable isn't reset under certain circumstances. If the relevant memory area happened to be freed and reused in a certain way, a bounds check could fail and memory outside a buffer could be written to, or uninitialized data could be disclosed.


Затронутые продукты
openSUSE Leap 15.1:libxslt-devel-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-devel-32bit-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-python-1.1.32-lp151.3.6.1
openSUSE Leap 15.1:libxslt-tools-1.1.32-lp151.3.6.1

Ссылки