blob: 905d929f2e97052a74ece0c1ed3917526aa8978c [file] [log] [blame]
<?xml version="1.0" encoding="UTF-8"?>
<glsa id="201401-07">
<title>libxslt: Denial of Service</title>
<synopsis>Multiple Denial of Service vulnerabilities have been found in
<product type="ebuild">libxslt</product>
<announced>January 10, 2014</announced>
<revised>January 10, 2014: 1</revised>
<package name="dev-libs/libxslt" auto="yes" arch="*">
<unaffected range="ge">1.1.28</unaffected>
<vulnerable range="lt">1.1.28</vulnerable>
<p>libxslt is the XSLT C library developed for the GNOME project. XSLT is
an XML language to define transformations for XML.
<p>Multiple vulnerabilities have been found in libxslt:</p>
<li>Multiple errors exist in pattern.c and functions.c (CVE-2012-2870,
<li>A double-free error exists in templates.c (CVE-2012-2893).</li>
<li>A NULL pointer dereference in keys.c (CVE-2012-6139).</li>
<li>An error in handling stylesheets containing DTDs (CVE-2013-4520).</li>
<impact type="normal">
<p>A remote attacker could entice a user to process a specially crafted
file in an application linked against libxslt, possibly resulting in a
Denial of Service condition.
<p>There is no known workaround at this time.</p>
<p>All libxslt users should upgrade to the latest version:</p>
# emerge --sync
# emerge --ask --oneshot --verbose "&gt;=dev-libs/libxslt-1.1.28"
<p>Packages which depend on this library may need to be recompiled. Tools
such as revdep-rebuild may assist in identifying some of these packages.
<uri link="">CVE-2012-2870</uri>
<uri link="">CVE-2012-2893</uri>
<uri link="">CVE-2012-6139</uri>
<uri link="">CVE-2013-4520</uri>
<metadata tag="requester" timestamp="Sun, 30 Sep 2012 01:49:44 +0000">ackle</metadata>
<metadata tag="submitter" timestamp="Fri, 10 Jan 2014 14:13:14 +0000">ackle</metadata>