[xml/sgml-pkgs] Bug#482664: CVE-2008-1767: buffver overflow in pattern.c
Steffen Joeris
steffen.joeris at skolelinux.de
Sat May 24 10:16:05 UTC 2008
Package: libxslt1.1
Version: 1.1.23-1
Severity: grave
Tags: security, patch
Justification: user security hole
Hi
The following CVE(0) has been issued against libxslt.
CVE-2008-1767:
Buffer overflow in pattern.c in libxslt before 1.1.24 allows
context-dependent attackers to cause a denial of service (crash) and
possibly execute arbitrary code via an XSL style sheet file with a long
XSLT "transformation match" condition that triggers a large number of
steps.
Upstream patch is attached.
Please mention the CVE id in your changelog, when you fix this bug.
Cheers
Steffen
(0): http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1767
-------------- next part --------------
A non-text attachment was scrubbed...
Name: patch
Type: text/x-c
Size: 7039 bytes
Desc: not available
Url : http://lists.alioth.debian.org/pipermail/debian-xml-sgml-pkgs/attachments/20080524/e4b292e4/attachment.bin
More information about the debian-xml-sgml-pkgs
mailing list