#12209: Fix CVE-2019-11068 in libxslt (Security Framework Bypass)
-------------------------+-----------------------
 Reporter:  renodr       |      Owner:  blfs-book
     Type:  enhancement  |     Status:  new
 Priority:  high         |  Milestone:  8.5
Component:  BOOK         |    Version:  SVN
 Severity:  normal       |   Keywords:
-------------------------+-----------------------
 I noticed a Debian Security Update for this on one of my debian machines,
 and thought it was worth a look into. After finding it, I came across
 this:

 [https://nvd.nist.gov/vuln/detail/CVE-2019-11068]

 {{{
 libxslt through 1.1.33 allows bypass of a protection mechanism because
 callers of xsltCheckRead and xsltCheckWrite permit access even upon
 receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL
 that is not actually invalid and is subsequently loaded.
 }}}

 We need to apply the following commit:

 
[https://gitlab.gnome.org/GNOME/libxslt/commit/e03553605b45c88f0b4b2980adfbbb8f6fca2fd6]

 Although the rest of the commits in the libxslt repo from the release of
 libxslt-1.1.33 onwards seem to be security related, so we might just want
 to create a consolidated patch. Mostly integer overflows it looks like.

--
Ticket URL: <http://wiki.linuxfromscratch.org/blfs/ticket/12209>
BLFS Trac <http://wiki.linuxfromscratch.org/blfs>
Beyond Linux From Scratch
-- 
http://lists.linuxfromscratch.org/listinfo/blfs-book
FAQ: http://www.linuxfromscratch.org/blfs/faq.html
Unsubscribe: See the above information page

Reply via email to