[xml/sgml-pkgs] Bug#482664: CVE-2008-1767: buffver overflow in pattern.c

Steffen Joeris steffen.joeris at skolelinux.de
Sat May 24 10:16:05 UTC 2008

Package: libxslt1.1
Version: 1.1.23-1
Severity: grave
Tags: security, patch
Justification: user security hole


The following CVE(0) has been issued against libxslt.


Buffer overflow in pattern.c in libxslt before 1.1.24 allows
context-dependent attackers to cause a denial of service (crash) and
possibly execute arbitrary code via an XSL style sheet file with a long
XSLT "transformation match" condition that triggers a large number of

Upstream patch is attached.

Please mention the CVE id in your changelog, when you fix this bug.


(0): http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1767
-------------- next part --------------
A non-text attachment was scrubbed...
Name: patch
Type: text/x-c
Size: 7039 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/debian-xml-sgml-pkgs/attachments/20080524/e4b292e4/attachment.bin 

More information about the debian-xml-sgml-pkgs mailing list